Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-25929— OpenEMR Patient Picture Context Allows Arbitrary Patient Photo Retrieval

CVSS 6.5 · Medium EPSS 0.13% · P32
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-25929

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
OpenEMR Patient Picture Context Allows Arbitrary Patient Photo Retrieval
Source: NVD (National Vulnerability Database)
Vulnerability Description
OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0, the document controller’s `patient_picture` context serves the patient’s photo by document ID or patient ID without verifying that the current user is authorized to access that patient. An authenticated user with document ACL can supply another patient’s ID and retrieve their photo. Version 8.0.0 fixes the issue.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
通过用户控制密钥绕过授权机制
Source: NVD (National Vulnerability Database)
Vulnerability Title
OpenEMR 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
OpenEMR是OpenEMR社区的一套开源的医疗管理系统。该系统可用于医疗实践管理、电子医疗记录、处方书写和医疗帐单申请。 OpenEMR 8.0.0之前版本存在安全漏洞,该漏洞源于文档控制器的patient_picture上下文未验证当前用户是否有权访问患者,可能导致具有文档ACL的经过身份验证的用户检索其他患者的照片。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
openemropenemr < 8.0.0 -

II. Public POCs for CVE-2026-25929

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-25929

登录查看更多情报信息。

Same Patch Batch · openemr · 2026-02-25 · 24 CVEs total

CVE-2026-2490810.0 CRITICALOpenEMR has SQL Injection in Patient API Sort Parameter
CVE-2026-2484910.0 CRITICALOpenEMR Arbitrary File Read Vulnerability
CVE-2026-251318.8 HIGHOpenEMR has Broken Access Control in Procedures Configuration
CVE-2026-257468.8 HIGHOpenEMR has SQL Injection Vulnerability
CVE-2025-692318.7 HIGHOpenEMR has a Stored XSS in GAD-7 Form that Enables Session Hijacking and Privilege Escala
CVE-2025-677528.1 HIGHOpenEMR Has Disabled SSL Certificate Verification in HTTP Client
CVE-2026-251648.1 HIGHOpenEMR's Document and Insurance REST Endpoints Skip ACL
CVE-2026-248908.1 HIGHOpenEMR Portal Users Can Forge Provider Signatures
CVE-2026-254767.5 HIGHOpenEMR has Session Timeout Bypass via skip_timeout_reset
CVE-2026-259277.1 HIGHOpenEMR Missing Authorization Checks in DICOM Viewer State API
CVE-2026-248966.5 MEDIUMOpenEMR has Broken Access Control that allows unauthorized access to EDI Logs
CVE-2026-251246.5 MEDIUMOpenEMR has Broken Access Control in Report/Clients/Message List CSV Export
CVE-2026-259306.5 MEDIUMOpenEMR's Printable LBF Endpoint Leaks Arbitrary Patient Forms
CVE-2026-248476.1 MEDIUMOpenEMR has Open Redirect in Eye Exam Form
CVE-2026-251354.5 MEDIUMOpenEMR's location resource for Group.$export operation returns entire patient/user popula
CVE-2026-25743OpenEMR has Stored XSS in Questionnaire answers
CVE-2025-67491OpenEMR has Stored XSS in ub04 helper
CVE-2026-25220OpenEMR Messages "Show All" Not Restricted to Admins
CVE-2026-23627OpenEMR has SQL Injection in Immunization Search/Report
CVE-2026-24487OpenEMR has FHIR Patient Compartment Bypass in CareTeam Resource

Showing top 20 of 24 CVEs. View all on vendor page &rarr; →

IV. Related Vulnerabilities

V. Comments for CVE-2026-25929

No comments yet


Leave a comment