Description
Directory traversal in portal/import_template.php in versions of OpenEMR before 5.0.1.4 allows a remote attacker authenticated in the patient portal to read arbitrary files via the "docid" parameter when the mode is set to get.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Joshua Fam · textwebappslinux
https://www.exploit-db.com/exploits/45202
References (3)
Core 3
Core References
Third Party Advisory x_refsource_misc
https://www.databreaches.net/openemr-patches-serious-vulnerabilities-uncovered-by-project-insecurity/
Exploit, Third Party Advisory, VDB Entry exploit
x_refsource_exploit-db
https://www.exploit-db.com/exploits/45202/
Patch, Third Party Advisory x_refsource_confirm
https://github.com/openemr/openemr/pull/1765/files
Scores
CVSS v3
6.5
EPSS
0.0192
EPSS Percentile
83.4%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Details
CWE
CWE-22
Status
published
Products (1)
open-emr/openemr
< 5.0.1.4
Published
Aug 13, 2018
Tracked Since
Feb 18, 2026