Description
A Path Traversal in setup.php in OpenEMR < 7.0.0 allows remote unauthenticated users to read arbitrary files by controlling a connection to an attacker-controlled MySQL server.
Exploits (1)
References (2)
Core 2
Core References
Patch, Release Notes
https://www.open-emr.org/wiki/index.php/OpenEMR_Patches#7.0.0_Patch_.2811.2F30.2F22.29
Exploit, Third Party Advisory
https://www.sonarsource.com/blog/openemr-remote-code-execution-in-your-healthcare-system/
Scores
CVSS v3
7.5
EPSS
0.0447
EPSS Percentile
89.1%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
yes
Technical Impact
partial
Details
CWE
CWE-552
Status
published
Products (1)
open-emr/openemr
< 7.0.0
Published
Feb 22, 2023
Tracked Since
Feb 18, 2026