Unrated severityNVD Advisory· Published Mar 3, 2026· Updated Mar 4, 2026
OpenEMR's payments gateway_api_key secret rendered into client JS code
CVE-2026-25146
Description
OpenEMR is a free and open source electronic health records and medical practice management application. From 5.0.2 to before 8.0.0, there are (at least) two paths where the gateway_api_key secret value is rendered to the client in plaintext. These secret keys being leaked could result in arbitrary money movement or broad account takeover of payment gateway APIs. This vulnerability is fixed in 8.0.0.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/openemr/openemr/blob/6a4e18c5ec73e0c755f6f65b28a9652aded1a58b/interface/patient_file/front_payment.phpmitrex_refsource_MISC
- github.com/openemr/openemr/blob/6a4e18c5ec73e0c755f6f65b28a9652aded1a58b/portal/portal_payment.phpmitrex_refsource_MISC
- github.com/openemr/openemr/commit/fe6341496dc82d5b4f5a3f35891bb2e2481f3b25mitrex_refsource_MISC
- github.com/openemr/openemr/security/advisories/GHSA-2hq8-wc73-jvvqmitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.