OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0.3, an Insecure Direct Object Reference (IDOR) vulnerability in the patient portal payment page allows any authenticated portal patient to access other patients' payment records — including invoice/billing data (PHI) and payment card metadata — by manipulating the `recid` query parameter in `portal/portal_payment.php`. Version 8.0.0.3 patches the issue.
References
| Link | Resource |
|---|---|
| https://github.com/openemr/openemr/commit/7bf30e0ec5587f80c19094d58df09d46ac328806 | Patch |
| https://github.com/openemr/openemr/releases/tag/v8_0_0_3 | Product |
| https://github.com/openemr/openemr/security/advisories/GHSA-hf37-5rp9-j27j | Vendor Advisory Exploit |
Configurations
History
No history.
Information
Published : 2026-03-26 00:16
Updated : 2026-03-26 16:29
NVD link : CVE-2026-33931
Mitre link : CVE-2026-33931
CVE.ORG link : CVE-2026-33931
JSON object : View
Products Affected
open-emr
- openemr
CWE
CWE-639
Authorization Bypass Through User-Controlled Key
