CVE-2026-32122
Unauthorized Access in OpenEMR Claim File Tracker AJAX Endpoint
Publication date: 2026-03-11
Last updated on: 2026-03-13
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| open-emr | openemr | to 8.0.0.1 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-862 | The product does not perform an authorization check when an actor attempts to access a resource or perform an action. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in OpenEMR versions prior to 8.0.0.1 within the Claim File Tracker feature. An AJAX endpoint returns billing claim metadata such as claim IDs, payer information, and transmission logs. However, this endpoint does not enforce the same access control list (ACL) as the main billing and claims workflow, allowing authenticated users without proper billing permissions to access sensitive billing data.
How can this vulnerability impact me? :
The vulnerability can lead to unauthorized disclosure of sensitive billing claim metadata to users who should not have access to this information. This could result in exposure of confidential patient billing details, potentially leading to privacy violations and misuse of billing data.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, you should upgrade OpenEMR to version 8.0.0.1 or later, where the issue with the Claim File Tracker AJAX endpoint has been fixed.