CVE-2026-24848

OpenEMR is a free and open source electronic health records and medical practice management application. In 7.0.4 and earlier, the disposeDocument() method in EtherFaxActions.php allows authenticated users to write arbitrary content to arbitrary locations on the server filesystem. This vulnerability can be exploited to achieve Remote Code Execution (RCE) by uploading malicious PHP web shells.
References
Link Resource
https://github.com/openemr/openemr/security/advisories/GHSA-5vp5-4rm6-h4c9 Exploit Mitigation Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:open-emr:openemr:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-03-03 22:16

Updated : 2026-03-04 21:58


NVD link : CVE-2026-24848

Mitre link : CVE-2026-24848

CVE.ORG link : CVE-2026-24848


JSON object : View

Products Affected

open-emr

  • openemr
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')