OpenEMR has Session Timeout Bypass via skip_timeout_reset
Description
OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0, the session expiration check in library/auth.inc.php runs only when skip_timeout_reset is not present in the request. When skip_timeout_reset=1 is sent, the entire block that calls SessionTracker::isSessionExpired() and forces logout on timeout is skipped. As a result, any request that includes this parameter (e.g. from auto-refresh pages like the Patient Flow Board) never runs the expiration check: expired sessions can continue to access data indefinitely, abandoned workstations stay active, and an attacker with a stolen session cookie can keep sending skip_timeout_reset=1 to avoid being logged out. Version 8.0.0 fixes the issue.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2- github.com/openemr/openemr/commit/02a6a7793402b10356a94626d78e0e1069e92a77mitrex_refsource_MISC
- github.com/openemr/openemr/security/advisories/GHSA-gx7q-6fhr-5h33mitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.