CVE-2026-32238 - Vulnerability Analysis
CriticalCVSS: 9.1Last Updated: March 19, 2026
OpenEMR - Command Injection
Overview
OpenEMR < 8.0.0.2 contains a command injection caused by insufficient input validation in the backup functionality, letting authenticated attackers execute arbitrary commands remotely, exploit requires authentication.
Severity & Score
Impact
Authenticated attackers can execute arbitrary commands, potentially leading to full system compromise.
Mitigation
Upgrade to version 8.0.0.2 or later.
References
Social Media Activity(2 posts)
š“ CVE-2026-32238 - Critical (9.1) OpenEMR is a free and open source electronic health records and medical practice management application. Versions prior to 8.0.0.2 contain a Command injection vulnerability in the backup functionality that can be exploited by authenticated attacke... š https://www.thehackerwire.com/vulnerability/CVE-2026-32238/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postš“ CVE-2026-32238 - Critical (9.1) OpenEMR is a free and open source electronic health records and medical practice management application. Versions prior to 8.0.0.2 contain a Command injection vulnerability in the backup functionality that can be exploited by authenticated attacke... š https://www.thehackerwire.com/vulnerability/CVE-2026-32238/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postGitHub Repositories(1 repo)
Related Resources
Details
- CVE ID
- CVE-2026-32238
- Severity
- Critical
- CVSS Score
- 9.1
- Type
- command_injection
- Status
- new
- EPSS
- 0.0%
- Social Posts
- 2
CWE
- CWE-78
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H