Vulnerability Details CVE-2026-25746
OpenEMR is a free and open source electronic health records and medical practice management application. Versions prior to 8.0.0 contain a SQL injection vulnerability in prescription that can be exploited by authenticated attackers. The vulnerability exists due to insufficient input validation in the prescription listing functionality. Version 8.0.0 fixes the vulnerability.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 0.1%
CVSS Severity
CVSS v3 Score 8.8
Products affected by CVE-2026-25746
-
cpe:2.3:a:open-emr:openemr:-
-
cpe:2.3:a:open-emr:openemr:2.0.1.2
-
cpe:2.3:a:open-emr:openemr:2.7
-
cpe:2.3:a:open-emr:openemr:2.7.1
-
cpe:2.3:a:open-emr:openemr:2.7.2
-
cpe:2.3:a:open-emr:openemr:2.7.3
-
cpe:2.3:a:open-emr:openemr:2.8.0
-
cpe:2.3:a:open-emr:openemr:2.8.1
-
cpe:2.3:a:open-emr:openemr:2.8.2
-
cpe:2.3:a:open-emr:openemr:2.8.3
-
cpe:2.3:a:open-emr:openemr:2.9.0
-
cpe:2.3:a:open-emr:openemr:3.0.0
-
cpe:2.3:a:open-emr:openemr:3.0.1
-
cpe:2.3:a:open-emr:openemr:3.1.0
-
cpe:2.3:a:open-emr:openemr:3.2.0
-
cpe:2.3:a:open-emr:openemr:4.0.0
-
cpe:2.3:a:open-emr:openemr:4.1.0
-
cpe:2.3:a:open-emr:openemr:4.1.1
-
cpe:2.3:a:open-emr:openemr:4.1.2
-
cpe:2.3:a:open-emr:openemr:4.1.2.3
-
cpe:2.3:a:open-emr:openemr:4.1.2.6
-
cpe:2.3:a:open-emr:openemr:4.1.2.7
-
cpe:2.3:a:open-emr:openemr:4.2.0
-
cpe:2.3:a:open-emr:openemr:4.2.0.3
-
cpe:2.3:a:open-emr:openemr:4.2.1
-
cpe:2.3:a:open-emr:openemr:4.2.2
-
cpe:2.3:a:open-emr:openemr:5.0.0
-
cpe:2.3:a:open-emr:openemr:5.0.0.5
-
cpe:2.3:a:open-emr:openemr:5.0.0.6
-
cpe:2.3:a:open-emr:openemr:5.0.1
-
cpe:2.3:a:open-emr:openemr:5.0.1-6
-
cpe:2.3:a:open-emr:openemr:5.0.1.1
-
cpe:2.3:a:open-emr:openemr:5.0.1.2
-
cpe:2.3:a:open-emr:openemr:5.0.1.3
-
cpe:2.3:a:open-emr:openemr:5.0.1.4
-
cpe:2.3:a:open-emr:openemr:5.0.1.5
-
cpe:2.3:a:open-emr:openemr:5.0.1.6
-
cpe:2.3:a:open-emr:openemr:5.0.1.7
-
cpe:2.3:a:open-emr:openemr:5.0.2
-
cpe:2.3:a:open-emr:openemr:5.0.2.1
-
cpe:2.3:a:open-emr:openemr:5.0.2.2
-
cpe:2.3:a:open-emr:openemr:5.0.2.3
-
cpe:2.3:a:open-emr:openemr:5.0.2.4
-
cpe:2.3:a:open-emr:openemr:5.0.2.5
-
cpe:2.3:a:open-emr:openemr:6.0.0
-
cpe:2.3:a:open-emr:openemr:6.0.0.1
-
cpe:2.3:a:open-emr:openemr:6.0.0.2
-
cpe:2.3:a:open-emr:openemr:6.0.0.3
-
cpe:2.3:a:open-emr:openemr:6.0.0.4
-
cpe:2.3:a:open-emr:openemr:6.1.0
-
cpe:2.3:a:open-emr:openemr:6.1.0.1
-
cpe:2.3:a:open-emr:openemr:7.0.0
-
cpe:2.3:a:open-emr:openemr:7.0.0.1
-
cpe:2.3:a:open-emr:openemr:7.0.0.2
-
cpe:2.3:a:open-emr:openemr:7.0.1
-
cpe:2.3:a:open-emr:openemr:7.0.1.1
-
cpe:2.3:a:open-emr:openemr:7.0.2
-
cpe:2.3:a:open-emr:openemr:7.0.2.1
-
cpe:2.3:a:open-emr:openemr:7.0.2.2
-
cpe:2.3:a:open-emr:openemr:7.0.2.3
-
cpe:2.3:a:open-emr:openemr:7.0.3
-
cpe:2.3:a:open-emr:openemr:7.0.3.1
-
cpe:2.3:a:open-emr:openemr:7.0.3.2
-
cpe:2.3:a:open-emr:openemr:7.0.3.3
-
cpe:2.3:a:open-emr:openemr:7.0.3.4
-
cpe:2.3:a:open-emr:openemr:7.0.4
-
cpe:2.3:a:open-emr:openemr:7.3.0