Cyber Posture

CVE-2026-24898

CriticalPublic PoC

Published: 03 March 2026

Published
03 March 2026
Modified
04 March 2026
KEV Added
Patch
CVSS Score 10.0 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
EPSS Score 0.0008 22.6th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries can steal application access tokens as a means of acquiring credentials to access remote systems and resources.

Security Summary

CVE-2026-24898 is an unauthenticated token disclosure vulnerability affecting OpenEMR, a free and open source electronic health records and medical practice management application, in versions prior to 8.0.0. The issue resides in the MedEx callback endpoint, which bypasses authentication by setting $ignoreAuth = true and performs a MedEx login whenever $_POST['callback_key'] is provided, returning a full JSON response that includes sensitive MedEx API tokens. This flaw, classified under CWE-287 (Improper Authentication), carries a maximum CVSS v3.1 base score of 10.0 (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H), indicating critical severity due to its network accessibility, low complexity, and lack of prerequisites.

Any unauthenticated visitor can exploit this vulnerability remotely by sending a POST request to the MedEx callback endpoint with a 'callback_key' parameter, triggering the disclosure of the practice's MedEx API tokens. Successful exploitation enables complete compromise of the third-party MedEx service, exfiltration of protected health information (PHI), unauthorized actions on the MedEx platform, and potential HIPAA violations, granting attackers high confidentiality, integrity, and availability impacts across the scoped network.

The vulnerability is fixed in OpenEMR version 8.0.0, as detailed in the project's security advisory (GHSA-qwff-3mw7-7rc7) and the corresponding commit (8e4de59ab58222f13abc4e4040128737d857db9c) on GitHub, which presumably addresses the authentication bypass and token exposure in the endpoint. Security practitioners should prioritize upgrading to 8.0.0 or later and review exposed instances for token leakage.

Details

CWE(s)
CWE-287

Affected Products

open-emr
openemr
≤ 8.0.0

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1528 Steal Application Access Token Credential Access
Adversaries can steal application access tokens as a means of acquiring credentials to access remote systems and resources.
Why these techniques?

T1190: Unauthenticated exploitation of public-facing OpenEMR web application endpoint. T1528: Direct disclosure of sensitive MedEx API tokens (application access tokens).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References