{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-13T06:35:45.999","vulnerabilities":[{"cve":{"id":"CVE-2026-33931","sourceIdentifier":"security-advisories@github.com","published":"2026-03-26T00:16:39.787","lastModified":"2026-03-26T16:29:06.480","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0.3, an Insecure Direct Object Reference (IDOR) vulnerability in the patient portal payment page allows any authenticated portal patient to access other patients' payment records — including invoice/billing data (PHI) and payment card metadata — by manipulating the `recid` query parameter in `portal/portal_payment.php`. Version 8.0.0.3 patches the issue."},{"lang":"es","value":"OpenEMR es una aplicación de gestión de registros médicos electrónicos y de práctica médica de código abierto y gratuita. Antes de la versión 8.0.0.3, una vulnerabilidad de Referencia Directa Insegura a Objeto (IDOR) en la página de pago del portal del paciente permite a cualquier paciente autenticado del portal acceder a los registros de pago de otros pacientes — incluyendo datos de facturación (PHI) y metadatos de tarjetas de pago — manipulando el parámetro de consulta 'recid' en 'portal/portal_payment.PHP'. La versión 8.0.0.3 corrige el problema."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":3.6}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Primary","description":[{"lang":"en","value":"CWE-639"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:open-emr:openemr:*:*:*:*:*:*:*:*","versionEndExcluding":"8.0.0.3","matchCriteriaId":"E3E098AF-42A1-4798-85A7-80052F19F809"}]}]}],"references":[{"url":"https://github.com/openemr/openemr/commit/7bf30e0ec5587f80c19094d58df09d46ac328806","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/openemr/openemr/releases/tag/v8_0_0_3","source":"security-advisories@github.com","tags":["Product"]},{"url":"https://github.com/openemr/openemr/security/advisories/GHSA-hf37-5rp9-j27j","source":"security-advisories@github.com","tags":["Vendor Advisory","Exploit"]}]}}]}