{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-03T00:19:32.711","vulnerabilities":[{"cve":{"id":"CVE-2026-34056","sourceIdentifier":"security-advisories@github.com","published":"2026-03-26T00:16:41.400","lastModified":"2026-03-26T16:15:22.680","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"OpenEMR is a free and open source electronic health records and medical practice management application. A Broken Access Control vulnerability in OpenEMR up to and including version 8.0.0.3 allows low-privilege users to view and download Ensora eRx error logs without proper authorization checks. This flaw compromises system confidentiality by exposing sensitive information, potentially leading to unauthorized data disclosure and misuse. As of time of publication, no known patches versions are available."},{"lang":"es","value":"OpenEMR es una aplicación de código abierto y gratuita para registros de salud electrónicos y gestión de consultorios médicos. Una vulnerabilidad de control de acceso roto en OpenEMR hasta la versión 8.0.0.3 inclusive permite a usuarios con bajos privilegios ver y descargar registros de errores de Ensora eRx sin las comprobaciones de autorización adecuadas. Esta falla compromete la confidencialidad del sistema al exponer información sensible, lo que podría llevar a la divulgación no autorizada de datos y su uso indebido. Al momento de la publicación, no hay versiones de parches conocidas disponibles."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N","baseScore":7.7,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.1,"impactScore":4.0},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":3.6}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Primary","description":[{"lang":"en","value":"CWE-285"},{"lang":"en","value":"CWE-425"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:open-emr:openemr:*:*:*:*:*:*:*:*","versionEndIncluding":"8.0.0.3","matchCriteriaId":"212E854F-1A4F-46BD-AF78-20E4931F574D"}]}]}],"references":[{"url":"https://github.com/openemr/openemr/releases/tag/v8_0_0_3","source":"security-advisories@github.com","tags":["Product"]},{"url":"https://github.com/openemr/openemr/security/advisories/GHSA-6qg7-6jf3-xrfh","source":"security-advisories@github.com","tags":["Exploit","Vendor Advisory"]}]}}]}