LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →
Home / Vulnerability Intelligence / CVE-2026-24890

CVE-2026-24890 - Vulnerability Analysis

HighCVSS: 8.1

Last Updated: February 27, 2026

OpenEMR - Authorization Bypass

Published: February 25, 2026Updated: February 27, 2026PoC AvailableRemote Exploitable

Overview

OpenEMR < 8.0.0 contains an authorization bypass caused by improper access control in the patient portal signature endpoint, letting authenticated portal users overwrite provider signatures, exploit requires authenticated portal access.

Severity & Score

Severity: High
CVSS Score: 8.1
EPSS Score: 2.8%(Probability of exploitation in next 30 days)

Impact

Authenticated portal users can forge provider signatures, leading to legal compliance violations and fraud.

Mitigation

Update to version 8.0.0 or later.

Social Media Activity(1 post)

TheHackerWire
TheHackerWire
@thehackerwire
Feb 25, 2026

🟠 CVE-2026-24890 - High (8.1) OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0, an authorization bypass vulnerability in the patient portal signature endpoint allows authenticated portal users to up... šŸ”— https://www.thehackerwire.com/vulnerability/CVE-2026-24890/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

View original post

Details

CVE ID
CVE-2026-24890
Severity
High
CVSS Score
8.1
Type
broken_access_control
Status
confirmed
EPSS
2.8%
Social Posts
1

CWE

  • CWE-285

CVSS Metrics

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

EPSS Score

2.8%Probability of exploitation in the next 30 days