{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-11T02:00:53.543","vulnerabilities":[{"cve":{"id":"CVE-2026-24488","sourceIdentifier":"security-advisories@github.com","published":"2026-02-27T17:16:30.497","lastModified":"2026-03-03T18:48:01.753","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"OpenEMR is a free and open source electronic health records and medical practice management application. In versions up to and including 8.0.0, an arbitrary file exfiltration vulnerability in the fax sending endpoint allows any authenticated user to read and transmit any file on the server (including database credentials, patient documents, system files, and source code) via fax to an attacker-controlled phone number. The vulnerability exists because the endpoint accepts arbitrary file paths from user input and streams them to the fax gateway without path restrictions or authorization checks. As of time of publication, no known patched versions are available."},{"lang":"es","value":"OpenEMR es una aplicación de gestión de práctica médica y registros de salud electrónicos de código abierto y gratuita. En versiones hasta la 8.0.0 inclusive, una vulnerabilidad de exfiltración de archivos arbitrarios en el endpoint de envío de fax permite a cualquier usuario autenticado leer y transmitir cualquier archivo en el servidor (incluyendo credenciales de la base de datos, documentos de pacientes, archivos del sistema y código fuente) vía fax a un número de teléfono controlado por el atacante. La vulnerabilidad existe porque el endpoint acepta rutas de archivo arbitrarias de la entrada del usuario y las transmite al gateway de fax sin restricciones de ruta o comprobaciones de autorización. Hasta el momento de la publicación, se conoce que haya versiones que parcheen el problema."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":3.6}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Primary","description":[{"lang":"en","value":"CWE-22"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:open-emr:openemr:*:*:*:*:*:*:*:*","versionEndIncluding":"8.0.0","matchCriteriaId":"1D995E4F-C6E0-47AC-9F5A-4E828BA9A292"}]}]}],"references":[{"url":"https://github.com/openemr/openemr/blob/v7_0_4/interface/modules/custom_modules/oe-module-faxsms/src/Controller/EtherFaxActions.php#L177-L221","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/openemr/openemr/security/advisories/GHSA-765x-8v97-c7g8","source":"security-advisories@github.com","tags":["Exploit","Vendor Advisory"]}]}}]}