Cyber Posture

CVE-2026-33301

HighPublic PoC

Published: 19 March 2026

Published
19 March 2026
Modified
20 March 2026
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
EPSS Score 0.0004 10.5th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may enumerate files and directories or may search in specific locations of a host or network share for certain information within a file system.

Security Summary

CVE-2026-33301 is an arbitrary file read vulnerability in OpenEMR, a free and open source electronic health records and medical practice management application. The issue affects versions prior to 8.0.0.2 and resides in the PDF creation function for Eye Exam forms within patient encounters. Specifically, form answers submitted by users are parsed as unescaped HTML, enabling the inclusion of arbitrary image files from the server in the generated PDF. The vulnerability is rated with a CVSS v3.1 base score of 8.1 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N) and is associated with CWE-116 (Improper Encoding or Escaping of Output).

The vulnerability can be exploited by authenticated users holding the "Notes - my encounters" role, who have permission to fill Eye Exam forms in patient encounters. By injecting malicious HTML into form answers that references arbitrary image files on the server, an attacker can trigger the PDF generation process to embed sensitive file contents as images. This results in high confidentiality and integrity impacts, allowing unauthorized access to and exposure of server files through the downloadable PDF, without requiring user interaction beyond normal workflow.

Mitigation is addressed in OpenEMR version 8.0.0.2, which fixes the unescaped HTML parsing in the PDF creation function. Security practitioners should upgrade to this version immediately. Additional details are available in the GitHub security advisory (GHSA-v9v3-q973-xp2h) and the fixing commit (dccc962f06bdf6105ca85c277915167caf3e7c28).

Details

CWE(s)
CWE-116

Affected Products

open-emr
openemr
≤ 8.0.0.2

MITRE ATT&CK Enterprise Techniques

T1005 Data from Local System Collection
Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.
T1083 File and Directory Discovery Discovery
Adversaries may enumerate files and directories or may search in specific locations of a host or network share for certain information within a file system.
Why these techniques?

Arbitrary file read vulnerability directly enables collection of data from local system files (T1005) and facilitates file and directory discovery (T1083) by allowing embedding of arbitrary server files in generated PDFs.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References