🔐 CVE Alert

CVE-2026-25745

MEDIUM 6.5

OpenEMR's Message Update Ignores Patient id

CVSS Score
6.5
EPSS Score
0.1%
EPSS Percentile
25th

OpenEMR is a free and open source electronic health records and medical practice management application. In versions up to and including 8.0.0, the message/note update endpoint (e.g. PUT or POST) updates by message/note ID only and does not verify that the message belongs to the current patient (or that the user is allowed to edit that patient’s notes). An authenticated user with notes permission can modify any patient’s messages by supplying another message ID. Commit 92a2ff9eaaa80674b3a934a6556e35e7aded5a41 contains a fix for the issue.

CWE CWE-639
Vendor openemr
Product openemr
Published Mar 18, 2026
Last Updated Mar 20, 2026
Stay Ahead of the Next One

Get instant alerts for openemr openemr

Be the first to know when new medium vulnerabilities affecting openemr openemr are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
High
Availability
None

Affected Versions

openemr / openemr
<= 8.0.0

References

NVD ↗ CVE.org ↗ EPSS Data ↗
github.com: https://github.com/openemr/openemr/security/advisories/GHSA-jm78-x5p7-52qh github.com: https://github.com/openemr/openemr/commit/92a2ff9eaaa80674b3a934a6556e35e7aded5a41