Unrated severityNVD Advisory· Published Mar 19, 2026· Updated Mar 21, 2026
OpenEMR Vulnerable to Path Traversal When Zipping DICOM Folders
CVE-2026-25928
Description
OpenEMR is a free and open source electronic health records and medical practice management application. Prior to 8.0.0.2, the DICOM zip/export feature uses a user-supplied destination or path component when creating the zip file, without sanitizing path traversal sequences (e.g. ../). An attacker with DICOM upload/export permission can write files outside the intended directory, potentially under the web root, leading to arbitrary file write and possibly remote code execution if PHP or other executable files can be written. Version 8.0.0.2 fixes the issue.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2- github.com/openemr/openemr/commit/ddcf04ea769a33cdc1932355224575478df70585mitrex_refsource_MISC
- github.com/openemr/openemr/security/advisories/GHSA-rppw-f689-6hrmmitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.