Vulnerability Description
OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0.3, an Insecure Direct Object Reference (IDOR) vulnerability in the patient portal payment page allows any authenticated portal patient to access other patients' payment records — including invoice/billing data (PHI) and payment card metadata — by manipulating the `recid` query parameter in `portal/portal_payment.php`. Version 8.0.0.3 patches the issue.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Open-Emr | Openemr | < 8.0.0.3 |
Related Weaknesses (CWE)
References
- https://github.com/openemr/openemr/commit/7bf30e0ec5587f80c19094d58df09d46ac3288Patch
- https://github.com/openemr/openemr/releases/tag/v8_0_0_3Product
- https://github.com/openemr/openemr/security/advisories/GHSA-hf37-5rp9-j27jVendor AdvisoryExploit
FAQ
What is CVE-2026-33931?
CVE-2026-33931 is a vulnerability with a CVSS score of 6.5 (MEDIUM). OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0.3, an Insecure Direct Object Reference (IDOR) vulnerability in the patie...
How severe is CVE-2026-33931?
CVE-2026-33931 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-33931?
Check the references section above for vendor advisories and patch information. Affected products include: Open-Emr Openemr.