CVE-2024-26476: n/a
An issue in open-emr before v.7.0.2 allows a remote attacker to escalate privileges via a crafted script to the formid parameter in the ereq_form.php component.
AI Analysis
Technical Summary
CVE-2024-26476 is a vulnerability identified in OpenEMR, an open-source electronic medical record and practice management software widely used in healthcare organizations. The flaw exists in the ereq_form.php component, specifically involving the formid parameter. An attacker with some existing privileges (PR:L) can craft a malicious script that manipulates this parameter to escalate their privileges within the system. The vulnerability falls under CWE-918, which relates to improper control of dynamically evaluated code, indicating that the crafted input may lead to unintended code execution or logic manipulation. The CVSS 3.1 base score is 3.5, reflecting a low severity due to the requirement of prior privileges and user interaction (UI:R). The attack vector is network-based (AV:N), meaning the attacker can exploit it remotely. The vulnerability impacts the integrity of the system but does not compromise confidentiality or availability. No patches or exploits are currently publicly available, but the issue is addressed in OpenEMR version 7.0.2 and later.
Potential Impact
The primary impact of this vulnerability is the potential for privilege escalation within OpenEMR systems, which could allow an attacker with limited access to gain higher-level permissions. This could lead to unauthorized modification of medical records or system configurations, undermining data integrity. While confidentiality and availability are not directly affected, the integrity compromise could have serious implications in healthcare settings where accurate patient data is critical. Exploitation requires some level of user privilege and interaction, limiting the scope of immediate risk. However, if exploited, it could facilitate further attacks or unauthorized administrative actions, potentially disrupting healthcare operations and patient care.
Mitigation Recommendations
Organizations should upgrade OpenEMR installations to version 7.0.2 or later, where this vulnerability is fixed. Until patching is possible, restrict access to the ereq_form.php component and monitor logs for unusual activity involving the formid parameter. Implement strict access controls to minimize the number of users with privileges that could be leveraged for escalation. Employ web application firewalls (WAFs) with rules to detect and block suspicious input patterns targeting formid or similar parameters. Conduct regular security audits and user activity monitoring to detect early signs of exploitation attempts. Educate users about the risks of executing untrusted scripts or actions that could trigger this vulnerability.
Affected Countries
United States, Canada, United Kingdom, Australia, Germany, France, India, Brazil, South Africa, Japan
CVE-2024-26476: n/a
Description
An issue in open-emr before v.7.0.2 allows a remote attacker to escalate privileges via a crafted script to the formid parameter in the ereq_form.php component.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-26476 is a vulnerability identified in OpenEMR, an open-source electronic medical record and practice management software widely used in healthcare organizations. The flaw exists in the ereq_form.php component, specifically involving the formid parameter. An attacker with some existing privileges (PR:L) can craft a malicious script that manipulates this parameter to escalate their privileges within the system. The vulnerability falls under CWE-918, which relates to improper control of dynamically evaluated code, indicating that the crafted input may lead to unintended code execution or logic manipulation. The CVSS 3.1 base score is 3.5, reflecting a low severity due to the requirement of prior privileges and user interaction (UI:R). The attack vector is network-based (AV:N), meaning the attacker can exploit it remotely. The vulnerability impacts the integrity of the system but does not compromise confidentiality or availability. No patches or exploits are currently publicly available, but the issue is addressed in OpenEMR version 7.0.2 and later.
Potential Impact
The primary impact of this vulnerability is the potential for privilege escalation within OpenEMR systems, which could allow an attacker with limited access to gain higher-level permissions. This could lead to unauthorized modification of medical records or system configurations, undermining data integrity. While confidentiality and availability are not directly affected, the integrity compromise could have serious implications in healthcare settings where accurate patient data is critical. Exploitation requires some level of user privilege and interaction, limiting the scope of immediate risk. However, if exploited, it could facilitate further attacks or unauthorized administrative actions, potentially disrupting healthcare operations and patient care.
Mitigation Recommendations
Organizations should upgrade OpenEMR installations to version 7.0.2 or later, where this vulnerability is fixed. Until patching is possible, restrict access to the ereq_form.php component and monitor logs for unusual activity involving the formid parameter. Implement strict access controls to minimize the number of users with privileges that could be leveraged for escalation. Employ web application firewalls (WAFs) with rules to detect and block suspicious input patterns targeting formid or similar parameters. Conduct regular security audits and user activity monitoring to detect early signs of exploitation attempts. Educate users about the risks of executing untrusted scripts or actions that could trigger this vulnerability.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-02-19T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6d77b7ef31ef0b572675
Added to database: 2/25/2026, 9:45:27 PM
Last enriched: 2/26/2026, 10:54:59 AM
Last updated: 4/12/2026, 11:44:37 AM
Views: 13
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.