๐Ÿ” CVE Alert

CVE-2026-25928

MEDIUM 6.5

OpenEMR Vulnerable to Path Traversal When Zipping DICOM Folders

CVSS Score
6.5
EPSS Score
0.1%
EPSS Percentile
24th

OpenEMR is a free and open source electronic health records and medical practice management application. Prior to 8.0.0.2, the DICOM zip/export feature uses a user-supplied destination or path component when creating the zip file, without sanitizing path traversal sequences (e.g. `../`). An attacker with DICOM upload/export permission can write files outside the intended directory, potentially under the web root, leading to arbitrary file write and possibly remote code execution if PHP or other executable files can be written. Version 8.0.0.2 fixes the issue.

CWE CWE-22
Vendor openemr
Product openemr
Published Mar 19, 2026
Last Updated Mar 21, 2026
Stay Ahead of the Next One

Get instant alerts for openemr openemr

Be the first to know when new medium vulnerabilities affecting openemr openemr are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
High
Availability
None

Affected Versions

openemr / openemr
< 8.0.0.2

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/openemr/openemr/security/advisories/GHSA-rppw-f689-6hrm github.com: https://github.com/openemr/openemr/commit/ddcf04ea769a33cdc1932355224575478df70585