High severity7.5NVD Advisory· Published May 5, 2026· Updated May 5, 2026
CVE-2023-54347
CVE-2023-54347
Description
OpenEMR 7.0.1 contains an authentication brute force vulnerability that allows attackers to bypass rate limiting protections by sending repeated login attempts to the main login endpoint. Attackers can submit POST requests with authUser and clearPass parameters to systematically test username and password combinations without account lockout restrictions.
Affected products
2Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- www.exploit-db.com/exploits/51413nvdExploitVDB Entry
- www.vulncheck.com/advisories/openemr-authentication-brute-force-mitigation-bypassnvdThird Party Advisory
- github.com/openemr/openemr/archive/refs/tags/v7_0_1.tar.gznvdProduct
- www.open-emr.orgnvdProduct
News mentions
3- ⚡ Weekly Recap: AI-Powered Phishing, Android Spying Tool, Linux Exploit, GitHub RCE & MoreThe Hacker News · May 4, 2026
- ThreatsDay Bulletin: SMS Blaster Busts, OpenEMR Flaws, 600K Roblox Hacks and 25 More StoriesThe Hacker News · Apr 30, 2026
- AI Finds 38 Security Flaws in Electronic Health Record PlatformDark Reading · Apr 29, 2026