CVE-2026-25928
OpenEMR Vulnerable to Path Traversal When Zipping DICOM Folders
CVSS Score
6.5
EPSS Score
0.1%
EPSS Percentile
24th
OpenEMR is a free and open source electronic health records and medical practice management application. Prior to 8.0.0.2, the DICOM zip/export feature uses a user-supplied destination or path component when creating the zip file, without sanitizing path traversal sequences (e.g. `../`). An attacker with DICOM upload/export permission can write files outside the intended directory, potentially under the web root, leading to arbitrary file write and possibly remote code execution if PHP or other executable files can be written. Version 8.0.0.2 fixes the issue.
| CWE | CWE-22 |
| Vendor | openemr |
| Product | openemr |
| Published | Mar 19, 2026 |
| Last Updated | Mar 21, 2026 |
Stay Ahead of the Next One
Get instant alerts for openemr openemr
Be the first to know when new medium vulnerabilities affecting openemr openemr are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
High
Availability
None
Affected Versions
openemr / openemr
< 8.0.0.2