{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-05T08:33:48.513","vulnerabilities":[{"cve":{"id":"CVE-2026-34051","sourceIdentifier":"security-advisories@github.com","published":"2026-03-26T00:16:40.850","lastModified":"2026-03-26T16:17:42.807","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"OpenEMR is a free and open source electronic health records and medical practice management application. Versions prior to 8.0.0.3 have an improper access control on the Import/Export functionality, allowing unauthorized users to perform import and export actions through direct request manipulation despite UI restrictions. This can lead to unauthorized data access, bulk data extraction, and manipulation of system data. Version 8.0.0.3 contains a fix."},{"lang":"es","value":"OpenEMR es una aplicación gratuita y de código abierto de registros médicos electrónicos y gestión de consultorios médicos. Las versiones anteriores a la 8.0.0.3 tienen un control de acceso inadecuado en la funcionalidad de Importación/Exportación, permitiendo a usuarios no autorizados realizar acciones de importación y exportación mediante la manipulación directa de solicitudes a pesar de las restricciones de la interfaz de usuario. Esto puede llevar a un acceso no autorizado a datos, extracción masiva de datos y manipulación de datos del sistema. La versión 8.0.0.3 contiene una solución."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N","baseScore":5.4,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":2.5}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Primary","description":[{"lang":"en","value":"CWE-285"},{"lang":"en","value":"CWE-425"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:open-emr:openemr:*:*:*:*:*:*:*:*","versionEndExcluding":"8.0.0.3","matchCriteriaId":"E3E098AF-42A1-4798-85A7-80052F19F809"}]}]}],"references":[{"url":"https://github.com/openemr/openemr/commit/81c097f7852fc60d45adf6c13baa86cd0a1b400b","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/openemr/openemr/releases/tag/v8_0_0_3","source":"security-advisories@github.com","tags":["Product"]},{"url":"https://github.com/openemr/openemr/security/advisories/GHSA-54m8-wpg9-9665","source":"security-advisories@github.com","tags":["Exploit","Vendor Advisory"]}]}}]}