Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
6.5
OpenEMR: Unauthorized access to sensitive medical log files
CVE-2026-24896
Summary
If you use OpenEMR version 7 or earlier, an attacker who has a basic login can view sensitive information about medical files and system activity. This is a risk because it could let unauthorized people see confidential patient data. Update to version 8.0.0 or later to fix the problem.
What to do
No fix is available yet. Check with your software vendor for updates.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| open-emr | openemr | <= 8.0.0 | – |
Original title
OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0, a Broken Access Control vulnerability exists in OpenEMR’s edih_main....
Original description
OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0, a Broken Access Control vulnerability exists in OpenEMR’s edih_main.php endpoint, which allows any authenticated user—including low-privilege roles like Receptionist—to access EDI log files by manipulating the log_select parameter in a GET request. The back-end fails to enforce role-based access control (RBAC), allowing sensitive system logs to be accessed outside the GUI-enforced permission boundaries. Version 8.0.0 fixes the issue.
nvd CVSS3.1
6.5
Vulnerability type
CWE-284
Improper Access Control
Published: 25 Feb 2026 · Updated: 12 Mar 2026 · First seen: 6 Mar 2026