CVE-2018-15142

HIGH

OpenEMR <5.0.1.4 - RCE

Title source: llm
STIX 2.1

Description

Directory traversal in portal/import_template.php in versions of OpenEMR before 5.0.1.4 allows a remote attacker authenticated in the patient portal to execute arbitrary PHP code by writing a file with a PHP extension via the "docid" and "content" parameters and accessing it in the traversed directory.

Exploits (1)

exploitdb WORKING POC VERIFIED
by Joshua Fam · textwebappslinux
https://www.exploit-db.com/exploits/45202

References (3)

Core 3
Core References
Exploit, Third Party Advisory, VDB Entry exploit x_refsource_exploit-db
https://www.exploit-db.com/exploits/45202/
Patch, Third Party Advisory x_refsource_confirm
https://github.com/openemr/openemr/pull/1765/files

Scores

CVSS v3 8.8
EPSS 0.0120
EPSS Percentile 79.0%
Attack Vector NETWORK
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-22
Status published
Products (1)
open-emr/openemr < 5.0.1.4
Published Aug 13, 2018
Tracked Since Feb 18, 2026