FortiGuard Labs is aware of a report that OpenEMR (Electronic Medical Records) released a patch for three vulnerabilities on November 30, 2022, two of which can be chained for remote code execution. Since OpenEMR is used to digitally manage health records of patient and supports electronic billing, successful exploitation can result in a confidential data leak.Why is this Significant?This is significant because approximately 100,000 healthcare institutions reportedly use OpenEMR to manage 200 million patients. Failing to update OpenEMR to the latest version can lead to significant data breach. What is OpenEMR?OpenEMR is a popular open source software that does not only digitally manage health records of patients but also support other features such as electronic billing, patient scheduling, drug and product inventory, and prescriptions. OpenEMR is designed to run on wide range of platforms such as Windows, MacOS and Linux, and supports more than 30 languages.What are the Vulnerabilities?According to SonarSource, they reported three vulnerabilities to OpenEMR:Unauthenticated file read vulnerability that allows an unauthenticated attacker to use a fraudulent MySQL server to read files from an OpenEMR instance.Authenticated local file inclusion vulnerability that allows an attacker to access files in directories which access is restricted by a .htaccess file.Authenticated reflected XSS vulnerability that allows an attacker to execute unauthenticated, arbitrary code in the context of the victim’s browser.The second and third vulnerability can be chained to achieve remote code execution, which can lead to information breach and potential system takeover.Note that CVE number is not available for all vulnerabilities.Has the Vendor Released a Patch for the Vulnerabilities?Yes, OpenEMR released a patch in version 7.0.0 on November 30th, 2022.What is the Status of Protection?FortiGuard Labs have the following IPS signatures in place for the OpenEMR vulnerabilities:OpenEMR.eye_mag_functions.php.Reflected.XSS (default action is set to “pass”)OpenEMR.new.php.File.Inclusion (default action is set to “pass”)
More Stories
pgbouncer-1.24.1-1.el9
FEDORA-EPEL-2025-be9d8a1131 Packages in this update: pgbouncer-1.24.1-1.el9 Update description: Update to 1.24.1, fixes CVE-2025-2291. Read More
pgbouncer-1.24.1-2.el8
FEDORA-EPEL-2025-f59a1a28d0 Packages in this update: pgbouncer-1.24.1-2.el8 Update description: Update to 1.24.1, fixes CVE-2025-2291. Read More
pgbouncer-1.24.1-2.fc40
FEDORA-2025-31397c2b6c Packages in this update: pgbouncer-1.24.1-2.fc40 Update description: Update to 1.24.1, fixes CVE-2025-2291. Read More
pgbouncer-1.24.1-2.fc42
FEDORA-2025-25e04398c7 Packages in this update: pgbouncer-1.24.1-2.fc42 Update description: Update to 1.24.1, fixes CVE-2025-2291. Read More
pgbouncer-1.24.1-2.el10_1
FEDORA-EPEL-2025-c1249be8e7 Packages in this update: pgbouncer-1.24.1-2.el10_1 Update description: Update to 1.24.1, fixes CVE-2025-2291. Read More
pgbouncer-1.24.1-2.fc41
FEDORA-2025-d919f11f99 Packages in this update: pgbouncer-1.24.1-2.fc41 Update description: Update to 1.24.1, fixes CVE-2025-2291. Read More