CVE-2026-25929

6.5 MEDIUM

📋 TL;DR

This vulnerability in OpenEMR allows authenticated users with document access control to bypass authorization checks and view other patients' photos by manipulating patient or document IDs. It affects all OpenEMR installations prior to version 8.0.0 where users have document ACL permissions.

💻 Affected Systems

Products:
  • OpenEMR
Versions: All versions prior to 8.0.0
Operating Systems: All platforms running OpenEMR
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user with document ACL permissions. The vulnerability exists in the patient_picture context of the document controller.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Healthcare privacy breach where sensitive patient photos are exposed to unauthorized personnel, potentially violating HIPAA and other privacy regulations.

🟠

Likely Case

Unauthorized access to patient photos by healthcare staff who shouldn't have access, leading to privacy violations and potential disciplinary actions.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls prevent unauthorized users from reaching the vulnerable endpoint.

🌐 Internet-Facing: MEDIUM - While authentication is required, exposed instances could be targeted by authenticated attackers.
🏢 Internal Only: HIGH - Healthcare environments often have many authenticated users who could exploit this for unauthorized access to patient data.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access and knowledge of patient/document IDs, which could be obtained through other means or enumeration.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 8.0.0

Vendor Advisory: https://github.com/openemr/openemr/security/advisories/GHSA-778w-r8rm-8qhq

Restart Required: Yes

Instructions:

1. Backup your OpenEMR installation and database. 2. Download OpenEMR 8.0.0 or later from the official repository. 3. Follow the OpenEMR upgrade documentation for your specific version path. 4. Verify the fix by testing patient photo access controls.

🔧 Temporary Workarounds

Restrict Document Controller Access

all

Implement network-level restrictions to limit access to the document controller endpoints to only authorized users or systems.

Temporary Code Modification

all

Add authorization checks to the patient_picture context in the document controller before serving patient photos.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate OpenEMR from unauthorized users
  • Enhance monitoring and logging of document controller access patterns

🔍 How to Verify

Check if Vulnerable:

Test if authenticated users can access patient photos by modifying patient ID parameters in document controller requests.

Check Version:

Check OpenEMR version in the application interface or via the database: SELECT * FROM version

Verify Fix Applied:

After upgrading to 8.0.0+, verify that unauthorized patient photo access attempts return proper authorization errors.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed authorization attempts for patient photo access
  • Unusual patterns of document controller requests with different patient IDs

Network Indicators:

  • HTTP requests to document controller endpoints with manipulated patient ID parameters

SIEM Query:

source="openemr_logs" AND (uri_path="/interface/document/document.php" OR uri_path LIKE "%/document/%") AND (param="patient" OR param="doc_id") AND status=200

🔗 References

📤 Share & Export