Cyber Posture

CVE-2026-25476

HighPublic PoC

Published: 25 February 2026

Published
25 February 2026
Modified
28 February 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS Score 0.0019 40.6th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-25476 is a high-severity Insufficient Session Expiration (CWE-613) vulnerability in Open-Emr Openemr. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Web Session Cookie (T1550.004); ranked at the 40.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

Threat & Defense at a Glance

What attackers do: exploitation maps to Web Session Cookie (T1550.004).
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-613

Locks the device (typically after inactivity) until re-authentication, addressing insufficient session expiration by preventing indefinite access.

addresses: CWE-613

Automatically terminating sessions after a defined period directly enforces session expiration, preventing indefinite session lifetimes that attackers can exploit.

addresses: CWE-613

Re-authentication after inactivity or time-based triggers prevents indefinite use of potentially hijacked or stale sessions.

addresses: CWE-613

Terminating sessions and network connections upon completion prevents insufficient session expiration.

addresses: CWE-613

Directly enforces termination of network sessions after inactivity or end-of-session, preventing indefinite session lifetime.

addresses: CWE-613

Consistent clocks across systems allow session expiration and timeout enforcement to function as intended in distributed environments.

addresses: CWE-613

When the non-persistent artifact is a session or connection, mandatory termination implements the missing expiration that CWE-613 describes.

addresses: CWE-613

Timed refresh of session-related information or on-demand generation plus deletion implements proper session expiration.

MITRE ATT&CK Enterprise TechniquesAI

T1550.004 Web Session Cookie Lateral Movement
Adversaries can use stolen session cookies to authenticate to web applications and services.
Why these techniques?

The session expiration bypass (via skip_timeout_reset=1) directly enables indefinite reuse of stolen/valid web session cookies for unauthorized access to the application, mapping to Use Alternate Authentication Material: Web Session Cookie.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0, the session expiration check in `library/auth.inc.php` runs only when `skip_timeout_reset` is not present in the request. When `skip_timeout_reset=1` is sent, the…

more

entire block that calls `SessionTracker::isSessionExpired()` and forces logout on timeout is skipped. As a result, any request that includes this parameter (e.g. from auto-refresh pages like the Patient Flow Board) never runs the expiration check: expired sessions can continue to access data indefinitely, abandoned workstations stay active, and an attacker with a stolen session cookie can keep sending `skip_timeout_reset=1` to avoid being logged out. Version 8.0.0 fixes the issue.

Deeper analysisAI

CVE-2026-25476 is a session expiration bypass vulnerability in OpenEMR, a free and open source electronic health records and medical practice management application. Prior to version 8.0.0, the session expiration check in `library/auth.inc.php` is skipped when the `skip_timeout_reset=1` parameter is present in requests. This allows expired sessions to bypass `SessionTracker::isSessionExpired()` checks and avoid forced logouts, enabling indefinite access to protected data. The vulnerability is rated 7.5 on the CVSS v3.1 scale (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) and maps to CWE-613 (Insufficient Session Expiration).

An attacker who obtains a valid session cookie—via methods such as theft from abandoned workstations, network interception, or prior compromises—can exploit this by including `skip_timeout_reset=1` in subsequent requests. This maintains session activity indefinitely, even after normal expiration, granting unauthorized access to sensitive patient data and medical records. Auto-refresh features like the Patient Flow Board naturally include this parameter, exacerbating risks from unattended sessions in clinical environments. No authentication is required beyond the stolen cookie, making it accessible over the network with low complexity.

The GitHub security advisory (GHSA-gx7q-6fhr-5h33) and fixing commit (02a6a7793402b10356a94626d78e0e1069e92a77) confirm that upgrading to OpenEMR version 8.0.0 resolves the issue by ensuring session checks always run regardless of the parameter. Practitioners should prioritize patching affected instances, monitor for anomalous session persistence, and implement strict session management controls like short timeouts and cookie security flags in the interim.

Details

CWE(s)

Affected Products

open-emr
openemr
≤ 8.0.0

CVEs Like This One

CVE-2026-25147Same product: Open-Emr Openemr
CVE-2026-33917Same product: Open-Emr Openemr
CVE-2026-25927Same product: Open-Emr Openemr
CVE-2026-32127Same product: Open-Emr Openemr
CVE-2026-24898Same product: Open-Emr Openemr
CVE-2026-33321Same product: Open-Emr Openemr
CVE-2026-25146Same product: Open-Emr Openemr
CVE-2025-29789Same product: Open-Emr Openemr
CVE-2026-33301Same product: Open-Emr Openemr
CVE-2026-25164Same product: Open-Emr Openemr

References