CVE-2026-24849

critical

Description

OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 7.0.4, the `disposeDocument()` method in `EtherFaxActions.php` allows authenticated users to read arbitrary files from the server filesystem. Any authenticated user (regardless of privilege level) can exploit this vulnerability to read sensitive files. Version 7.0.4 patches the issue.

References

https://github.com/openemr/openemr/security/advisories/GHSA-w6vc-hx2x-48pc

https://github.com/openemr/openemr/commit/22f8e53e5769a88b7a16cb223bd197d044c84e5a

Details

Source: Mitre, NVD

Published: 2026-02-25

Updated: 2026-02-25

Risk Information

CVSS v2

Base Score: 4

Vector: CVSS2#AV:N/AC:L/Au:S/C:P/I:N/A:N

Severity: Medium

CVSS v3

Base Score: 9.9

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

Severity: Critical