CVE-2026-24890
Received Received - Intake
Authorization Bypass in OpenEMR Patient Portal Enables Signature Forgery

Publication date: 2026-02-25

Last updated on: 2026-02-27

Assigner: GitHub, Inc.

Description
OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0, an authorization bypass vulnerability in the patient portal signature endpoint allows authenticated portal users to upload and overwrite provider signatures by setting `type=admin-signature` and specifying any provider user ID. This could potentially lead to signature forgery on medical documents, legal compliance violations, and fraud. The issue occurs when portal users are allowed to modify provider signatures without proper authorization checks. Version 8.0.0 fixes the issue.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-25
Last Modified
2026-02-27
Generated
2026-05-07
AI Q&A
2026-02-25
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
open-emr openemr to 8.0.0 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-285 The product does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-24890 is an authorization bypass vulnerability in OpenEMR versions prior to 8.0.0 that affects the patient portal signature saving endpoint.

Authenticated patient portal users can exploit this flaw by sending a specially crafted request with the parameter type=admin-signature and specifying any provider user ID. This allows them to upload and overwrite provider signatures without proper authorization.

The vulnerability arises because the system forcibly sets the patient ID to 0 when type=admin-signature is used, bypassing patient-specific authorization checks, and it accepts the provider user ID directly from user input without validation.

This enables portal users to impersonate providers by forging their signatures on medical documents.


How can this vulnerability impact me? :

This vulnerability allows unauthorized users to modify and forge provider signatures on medical documents.

Such forgery can lead to legal compliance violations and fraud.

Healthcare providers, patients, and organizations using OpenEMR are at risk because forged signatures can undermine the trustworthiness and authenticity of medical records.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability can lead to violations of legal and compliance requirements because it allows unauthorized modification and forgery of provider signatures on medical documents.

Such unauthorized changes to medical records can compromise data integrity and authenticity, which are critical for compliance with standards like HIPAA that mandate the protection and accuracy of health information.

This could result in regulatory penalties and loss of trust from patients and regulatory bodies.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': 'This vulnerability can be detected by monitoring for suspicious POST requests to the patient portal signature saving endpoint, specifically to the URL path `portal/sign/lib/save-signature.php`.'}, {'type': 'paragraph', 'content': 'Look for POST requests containing the parameter `type=admin-signature` along with a `user` parameter specifying a provider user ID. Such requests indicate attempts to bypass authorization and overwrite provider signatures.'}, {'type': 'paragraph', 'content': 'Commands to detect such activity could include using network traffic inspection tools or web server logs to filter for these POST requests. For example, using `grep` on web server logs:'}, {'type': 'list_item', 'content': "grep 'POST /portal/sign/lib/save-signature.php' /var/log/apache2/access.log | grep 'type=admin-signature'"}, {'type': 'paragraph', 'content': 'Alternatively, using tools like Wireshark or tcpdump to capture HTTP POST traffic and filter for the `type=admin-signature` parameter in the request body can help identify exploitation attempts.'}] [2]


What immediate steps should I take to mitigate this vulnerability?

[{'type': 'paragraph', 'content': 'The immediate mitigation step is to upgrade OpenEMR to version 8.0.0 or later, where this vulnerability has been fixed.'}, {'type': 'paragraph', 'content': "The fix involves blocking portal users from using the `admin-signature` type and enforcing that the user ID parameter is overridden with the session's patient ID, preventing unauthorized signature overwrites."}, {'type': 'paragraph', 'content': 'Until the upgrade can be applied, consider restricting access to the vulnerable endpoint or monitoring and blocking suspicious POST requests containing `type=admin-signature`.'}] [1, 2]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart