{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-22T04:08:39.514","vulnerabilities":[{"cve":{"id":"CVE-2025-67645","sourceIdentifier":"security-advisories@github.com","published":"2026-01-28T00:15:49.770","lastModified":"2026-02-12T20:50:17.233","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"OpenEMR is a free and open source electronic health records and medical practice management application. Versions prior to 7.0.4 have a broken access control in the Profile Edit endpoint. An authenticated normal user can modify the request parameters (pubpid / pid) to reference another user’s record; the server accepts the modified IDs and applies the changes to that other user’s profile. This allows one user to alter another user’s profile data (name, contact info, etc.), and could enable account takeover. Version 7.0.4 fixes the issue."},{"lang":"es","value":"OpenEMR es una aplicación de código abierto y gratuita para la gestión de registros médicos electrónicos y consultorios médicos. Versiones anteriores a la 7.0.4 tienen un control de acceso roto en el endpoint de Edición de Perfil. Un usuario normal autenticado puede modificar los parámetros de la solicitud (pubpid / pid) para hacer referencia al registro de otro usuario; el servidor acepta los IDs modificados y aplica los cambios al perfil de ese otro usuario. Esto permite a un usuario alterar los datos de perfil de otro usuario (nombre, información de contacto, etc.), y podría habilitar la toma de control de la cuenta. La versión 7.0.4 corrige el problema."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Primary","description":[{"lang":"en","value":"CWE-284"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:open-emr:openemr:7.0.3:*:*:*:*:*:*:*","matchCriteriaId":"18BC702B-0009-4E6C-AC2E-08DE77F6A612"}]}]}],"references":[{"url":"https://github.com/openemr/openemr/commit/e2a682ee71aac71a9f04ae566f4ffca10052bc4a","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/openemr/openemr/security/advisories/GHSA-vjmv-cf46-gffv","source":"security-advisories@github.com","tags":["Exploit","Vendor Advisory"]}]}}]}