Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
6.5
OpenEMR: Malicious users can read sensitive files on the server
CVE-2026-24849
Summary
A security issue in OpenEMR allows any user with an account to access sensitive files on the server. This could potentially expose confidential patient information. To fix this, upgrade to version 7.0.4 or later.
What to do
No fix is available yet. Check with your software vendor for updates.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| open-emr | openemr | <= 7.0.4 | – |
Original title
OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 7.0.4, the `disposeDocument()` method in `EtherFaxActions.php` allows authe...
Original description
OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 7.0.4, the `disposeDocument()` method in `EtherFaxActions.php` allows authenticated users to read arbitrary files from the server filesystem. Any authenticated user (regardless of privilege level) can exploit this vulnerability to read sensitive files. Version 7.0.4 patches the issue.
nvd CVSS3.1
6.5
Vulnerability type
CWE-22
Path Traversal
- https://github.com/openemr/openemr/commit/22f8e53e5769a88b7a16cb223bd197d044c84e... Patch
- https://github.com/openemr/openemr/security/advisories/GHSA-w6vc-hx2x-48pc Exploit Mitigation Vendor Advisory
Published: 25 Feb 2026 · Updated: 12 Mar 2026 · First seen: 6 Mar 2026