{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-11T02:51:31.868","vulnerabilities":[{"cve":{"id":"CVE-2026-32122","sourceIdentifier":"security-advisories@github.com","published":"2026-03-11T21:16:17.997","lastModified":"2026-03-13T15:48:07.257","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"OpenEMR is a free and open source electronic health records and medical practice management application. Prior to 8.0.0.1, the Claim File Tracker feature exposes an AJAX endpoint that returns billing claim metadata (claim IDs, payer info, transmission logs). The endpoint does not enforce the same ACL as the main billing/claims workflow, so authenticated users without appropriate billing permissions can access this data. This vulnerability is fixed in 8.0.0.1."},{"lang":"es","value":"OpenEMR es una aplicación gratuita y de código abierto de registros médicos electrónicos y gestión de práctica médica. Anterior a la 8.0.0.1, la funcionalidad de Seguimiento de Archivos de Reclamaciones expone un endpoint AJAX que devuelve metadatos de reclamaciones de facturación (IDs de reclamación, información del pagador, registros de transmisión). El endpoint no aplica la misma ACL que el flujo de trabajo principal de facturación/reclamaciones, por lo que los usuarios autenticados sin los permisos de facturación adecuados pueden acceder a estos datos. Esta vulnerabilidad se corrige en la 8.0.0.1."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N","baseScore":4.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":1.4}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Primary","description":[{"lang":"en","value":"CWE-862"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:open-emr:openemr:*:*:*:*:*:*:*:*","versionEndExcluding":"8.0.0.1","matchCriteriaId":"136D07EE-9108-423B-AD86-E9E901940C17"}]}]}],"references":[{"url":"https://github.com/openemr/openemr/security/advisories/GHSA-rwf9-px3c-3prw","source":"security-advisories@github.com","tags":["Exploit","Vendor Advisory"]}]}}]}