{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-33910","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2026-03-24T15:41:47.491Z","datePublished":"2026-03-25T22:41:02.472Z","dateUpdated":"2026-03-26T19:52:11.910Z"},"containers":{"cna":{"title":"OpenEMR has a SQL Injection Vulnerability in patient selection","problemTypes":[{"descriptions":[{"cweId":"CWE-89","lang":"en","description":"CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":7.2,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"HIGH","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","version":"3.1"}}],"references":[{"name":"https://github.com/openemr/openemr/security/advisories/GHSA-x32c-xj5g-7jx7","tags":["x_refsource_CONFIRM"],"url":"https://github.com/openemr/openemr/security/advisories/GHSA-x32c-xj5g-7jx7"},{"name":"https://github.com/openemr/openemr/commit/73db3264aed253684532839380cae3b0a56c83d2","tags":["x_refsource_MISC"],"url":"https://github.com/openemr/openemr/commit/73db3264aed253684532839380cae3b0a56c83d2"},{"name":"https://github.com/openemr/openemr/releases/tag/v8_0_0_3","tags":["x_refsource_MISC"],"url":"https://github.com/openemr/openemr/releases/tag/v8_0_0_3"}],"affected":[{"vendor":"openemr","product":"openemr","versions":[{"version":"< 8.0.0.3","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2026-03-25T22:41:02.472Z"},"descriptions":[{"lang":"en","value":"OpenEMR is a free and open source electronic health records and medical practice management application. Versions up to and including 8.0.0.2 contain a SQL injection vulnerability in the patient selection feature that can be exploited by authenticated attackers. The vulnerability exists due to insufficient input validation in the patient selection feature. Version 8.0.0.3 contains a patch."}],"source":{"advisory":"GHSA-x32c-xj5g-7jx7","discovery":"UNKNOWN"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2026-33910","role":"CISA Coordinator","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"total"}],"version":"2.0.3","timestamp":"2026-03-26T19:36:15.493843Z"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-03-26T19:52:11.910Z"}}]}}