Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-26476: n/a

0
Low
VulnerabilityCVE-2024-26476cvecve-2024-26476
Published: Wed Feb 28 2024 (02/28/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-26476 is a low-severity vulnerability in OpenEMR versions before 7. 0. 2 that allows a remote attacker with limited privileges to escalate their privileges by exploiting a crafted script targeting the formid parameter in the ereq_form. php component. Exploitation requires user interaction and some level of existing privileges. The vulnerability impacts the integrity of the system but does not affect confidentiality or availability. No known exploits are currently reported in the wild. Organizations using vulnerable OpenEMR versions should prioritize patching to prevent potential privilege escalation attacks.

AI-Powered Analysis

AILast updated: 02/26/2026, 10:54:59 UTC

Technical Analysis

CVE-2024-26476 is a vulnerability identified in OpenEMR, an open-source electronic medical record and practice management software widely used in healthcare organizations. The flaw exists in the ereq_form.php component, specifically involving the formid parameter. An attacker with some existing privileges (PR:L) can craft a malicious script that manipulates this parameter to escalate their privileges within the system. The vulnerability falls under CWE-918, which relates to improper control of dynamically evaluated code, indicating that the crafted input may lead to unintended code execution or logic manipulation. The CVSS 3.1 base score is 3.5, reflecting a low severity due to the requirement of prior privileges and user interaction (UI:R). The attack vector is network-based (AV:N), meaning the attacker can exploit it remotely. The vulnerability impacts the integrity of the system but does not compromise confidentiality or availability. No patches or exploits are currently publicly available, but the issue is addressed in OpenEMR version 7.0.2 and later.

Potential Impact

The primary impact of this vulnerability is the potential for privilege escalation within OpenEMR systems, which could allow an attacker with limited access to gain higher-level permissions. This could lead to unauthorized modification of medical records or system configurations, undermining data integrity. While confidentiality and availability are not directly affected, the integrity compromise could have serious implications in healthcare settings where accurate patient data is critical. Exploitation requires some level of user privilege and interaction, limiting the scope of immediate risk. However, if exploited, it could facilitate further attacks or unauthorized administrative actions, potentially disrupting healthcare operations and patient care.

Mitigation Recommendations

Organizations should upgrade OpenEMR installations to version 7.0.2 or later, where this vulnerability is fixed. Until patching is possible, restrict access to the ereq_form.php component and monitor logs for unusual activity involving the formid parameter. Implement strict access controls to minimize the number of users with privileges that could be leveraged for escalation. Employ web application firewalls (WAFs) with rules to detect and block suspicious input patterns targeting formid or similar parameters. Conduct regular security audits and user activity monitoring to detect early signs of exploitation attempts. Educate users about the risks of executing untrusted scripts or actions that could trigger this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-02-19T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d77b7ef31ef0b572675

Added to database: 2/25/2026, 9:45:27 PM

Last enriched: 2/26/2026, 10:54:59 AM

Last updated: 2/26/2026, 11:09:03 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats