HomeMalware & ThreatsResearchers Identify 38 Flaws in OpenEMR That Have Been Fixed

Researchers Identify 38 Flaws in OpenEMR That Have Been Fixed

Published on

spot_img
AI Tool Used to Discover Bugs, Which Included 2 Maximum Severity Vulnerabilities

Researchers Identify 38 Flaws in OpenEMR That Have Been Fixed
Security researchers at AISLE said they recently identified 38 vulnerabilities in OpenEMR’s open-source electronic medical record software. The flaws are fixed. (Image: OpenEMR)

In a recent security assessment, researchers from the firm AISLE uncovered a total of 38 vulnerabilities within OpenEMR, an open-source electronic medical record software platform utilized by approximately 100,000 healthcare providers worldwide. The researchers emphasized that two of these identified issues are classified as maximum severity zero-day vulnerabilities.

Utilizing sophisticated artificial intelligence-driven analysis, the AISLE research team conducted their investigation early this year. OpenEMR, which has achieved certification from U.S. government standards for electronic health record systems, released its latest version, 8.0, in February. This recent update indicates the platform’s commitment to maintaining stringent security measures while serving a large number of healthcare professionals.

The most concerning vulnerabilities detected during this examination were ranked with a Common Vulnerability Scoring System (CVSS) score of 10.0, indicating their maximum severity. Exploitation of these vulnerabilities poses a grave risk, potentially leading to complete database compromise, extensive data exfiltration, and remote code execution on the servers where the software operates.

The first vulnerability, identified as CVE-2026-24898, pertains to an unauthenticated patient identity disclosure. This flaw is particularly alarming because it can be exploited by any entity with internet access to an OpenEMR instance, requiring no login credentials whatsoever. The researchers highlighted that this vulnerability stems from the configuration of the MedEx recall/reminder callback endpoint, which is erroneously set to allow unauthenticated access, thereby enabling any visitor to interact with it.

According to AISLE, this misconfiguration allows malicious actors to make POST requests to the MedEx recall/reminder endpoint and subsequently receive sensitive medical practice API tokens in the response. With access to these tokens, perpetrators could gain insights into crucial patient identity and contact information, along with appointment metadata, amplifying the potential harm.

The second major vulnerability, noted as CVE-2026-24908, was characterized as an SQL injection flaw. Found within OpenEMR’s Patient REST API, this issue arises from how the software handles the _sort query parameter, which is ordinarily used for ordering returned results — a standard practice in REST API design. However, the problematic implementation leads to a situation where values for _sort are combined directly into SQL ORDER BY clauses without proper validation, whitelisting, or identifier escaping, thus enabling potential SQL injection attacks.

In addition to these high-severity findings, the researchers compiled information on a variety of other vulnerabilities, categorizing them according to their severity levels. These included 25 vulnerabilities linked to missing or incorrect authorization, nine instances of cross-site scripting vulnerabilities, and five additional issues relating to SQL injections, path traversal, and session management flaws. Collectively, these vulnerabilities expose a roadmap of risks that could impact not only individual healthcare providers but also the overarching integrity of patient data across the platform.

The comprehensive disclosure of these vulnerabilities signals a significant focus within the healthcare sector on cybersecurity, particularly during a period when reliance on digital medical records is ever-increasing. As healthcare providers consider the implications of such findings, proactive measures to enhance security protocols alongside regular updates to software can serve as crucial strategies in mitigating potential risks in the future.

Source link

Latest articles

Cyber Briefing – April 28, 2026: CyberMaterial

Cybersecurity Trends: A Comprehensive Overview In an era defined by rapid technological advancement, the cybersecurity...

Medtronic Acknowledges Data Breach Following ShinyHunters Allegations

Medical device giant Medtronic has recently confirmed a significant data security incident impacting its...

The Next Wave of Identity Risk: Securing Non-Human Identities in an AI-Driven World Webinar

The Next Wave of Identity Risk: Securing Non-Human Identities in an AI-Driven World ...

Hugging Face LeRobot Vulnerability Exposes System to Remote Code Execution Attacks

A serious remote code execution (RCE) vulnerability has been identified in Hugging Face’s LeRobot,...

More like this

Cyber Briefing – April 28, 2026: CyberMaterial

Cybersecurity Trends: A Comprehensive Overview In an era defined by rapid technological advancement, the cybersecurity...

Medtronic Acknowledges Data Breach Following ShinyHunters Allegations

Medical device giant Medtronic has recently confirmed a significant data security incident impacting its...

The Next Wave of Identity Risk: Securing Non-Human Identities in an AI-Driven World Webinar

The Next Wave of Identity Risk: Securing Non-Human Identities in an AI-Driven World ...