{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-34056","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2026-03-25T15:29:04.747Z","datePublished":"2026-03-25T23:53:15.789Z","dateUpdated":"2026-03-28T01:53:13.991Z"},"containers":{"cna":{"title":"OpenEMR has a Privilege Escalation that Allows a Low-Level User to View Admin-Only Data","problemTypes":[{"descriptions":[{"cweId":"CWE-285","lang":"en","description":"CWE-285: Improper Authorization","type":"CWE"}]},{"descriptions":[{"cweId":"CWE-425","lang":"en","description":"CWE-425: Direct Request ('Forced Browsing')","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":7.7,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"NONE","privilegesRequired":"LOW","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N","version":"3.1"}}],"references":[{"name":"https://github.com/openemr/openemr/security/advisories/GHSA-6qg7-6jf3-xrfh","tags":["x_refsource_CONFIRM"],"url":"https://github.com/openemr/openemr/security/advisories/GHSA-6qg7-6jf3-xrfh"},{"name":"https://github.com/openemr/openemr/releases/tag/v8_0_0_3","tags":["x_refsource_MISC"],"url":"https://github.com/openemr/openemr/releases/tag/v8_0_0_3"}],"affected":[{"vendor":"openemr","product":"openemr","versions":[{"version":"<= 8.0.0.3","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2026-03-25T23:53:15.789Z"},"descriptions":[{"lang":"en","value":"OpenEMR is a free and open source electronic health records and medical practice management application. A Broken Access Control vulnerability in OpenEMR up to and including version 8.0.0.3 allows low-privilege users to view and download Ensora eRx error logs without proper authorization checks. This flaw compromises system confidentiality by exposing sensitive information, potentially leading to unauthorized data disclosure and misuse. As of time of publication, no known patches versions are available."}],"source":{"advisory":"GHSA-6qg7-6jf3-xrfh","discovery":"UNKNOWN"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-03-28T01:52:52.463511Z","id":"CVE-2026-34056","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-03-28T01:53:13.991Z"}}]}}