CVE-2026-33321
🟡 Monitoruj
Podatność OOB SSRF w OpenEMR umożliwia atakującym fałszowanie żądań do zasobów wewnętrznych lub zewnętrznych serwera.
CVSS
7.6
EPSS
0.1%
Exploit
poc
Vendor
open-emr
Opis źródłowy (NVD)
OpenEMR is a free and open source electronic health records and medical practice management application. Prior to 8.0.0.2, users with the `Notes - my encounters` role can fill Eye Exam forms in patient encounters. The answers to the form can be printed out in PDF form. An Out-of-Band Server-Side Request Forgery (OOB SSRF) vulnerability was identified in the PDF creation function where the form answers are parsed as unescaped HTML, allowing an attacker to forge requests from the server made to external or internal resources. Version 8.0.0.2 fixes the issue.
exploit ssrf
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 7.6 |
| CISA KEV (aktywnie wykorzystywane) | Nie |
| FIRST EPSS (prawdopodobieństwo exploita) | 0.1% |
| Opublikowano (NVD) | 2026-03-19 21:17:12 UTC |
| Ostatnia modyfikacja (NVD) | 2026-03-20 15:03:34 UTC |
Referencje
- https://github.com/openemr/openemr/commit/dccc962f06bdf6105ca85c277915167caf3e7c28 (security-advisories@github.com) [Patch]
- https://github.com/openemr/openemr/security/advisories/GHSA-5pc3-2crw-96rv (security-advisories@github.com) [Exploit, Vendor Advisory]