Vulnerability Description
OpenEMR is a free and open source electronic health records and medical practice management application. Versions up to and including 8.0.0.2 contain a SQL injection vulnerability in the patient selection feature that can be exploited by authenticated attackers. The vulnerability exists due to insufficient input validation in the patient selection feature. Version 8.0.0.3 contains a patch.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Open-Emr | Openemr | < 8.0.0.3 |
Related Weaknesses (CWE)
References
- https://github.com/openemr/openemr/commit/73db3264aed253684532839380cae3b0a56c83Patch
- https://github.com/openemr/openemr/releases/tag/v8_0_0_3Product
- https://github.com/openemr/openemr/security/advisories/GHSA-x32c-xj5g-7jx7ExploitVendor Advisory
FAQ
What is CVE-2026-33910?
CVE-2026-33910 is a vulnerability with a CVSS score of 7.2 (HIGH). OpenEMR is a free and open source electronic health records and medical practice management application. Versions up to and including 8.0.0.2 contain a SQL injection vulnerability in the patient selec...
How severe is CVE-2026-33910?
CVE-2026-33910 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-33910?
Check the references section above for vendor advisories and patch information. Affected products include: Open-Emr Openemr.