CVE-2026-25746
Published: 25 February 2026
Summary
CVE-2026-25746 is a high-severity SQL Injection (CWE-89) vulnerability in Open-Emr Openemr. Its CVSS base score is 8.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 0.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly requires validating user inputs to the prescription listing functionality to block SQL injection exploitation.
Mandates timely flaw remediation by patching to OpenEMR version 8.0.0, which fixes the input validation deficiency.
Enforces input restrictions such as character sets and lengths to restrict malicious SQL payloads in prescription queries.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SQL injection in public-facing OpenEMR web app directly enables T1190 exploitation for initial access; facilitates unauthorized DB queries for data exfiltration (T1213.006) and record modification (T1565.001).
NVD Description
OpenEMR is a free and open source electronic health records and medical practice management application. Versions prior to 8.0.0 contain a SQL injection vulnerability in prescription that can be exploited by authenticated attackers. The vulnerability exists due to insufficient input…
more
validation in the prescription listing functionality. Version 8.0.0 fixes the vulnerability.
Deeper analysisAI
CVE-2026-25746 is a SQL injection vulnerability (CWE-89) affecting OpenEMR, a free and open source electronic health records and medical practice management application. The flaw exists in the prescription listing functionality due to insufficient input validation and impacts all versions prior to 8.0.0. Published on 2026-02-25, it carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating high severity with network accessibility, low attack complexity, and significant impacts on confidentiality, integrity, and availability.
Authenticated attackers with low privileges can exploit this vulnerability remotely over the network without user interaction. By injecting malicious SQL payloads into the prescription listing interface, they can manipulate database queries, potentially extracting sensitive patient data, modifying records, or disrupting service availability.
Mitigation is addressed in OpenEMR version 8.0.0, which resolves the input validation issue. Relevant code locations include library/classes/Controller.class.php (line 77), controller.php (line 6), controllers/C_Prescription.class.php (line 180), and library/classes/Prescription.class.php (line 1148), as detailed in the project's GitHub repository. A proof-of-concept is available at https://github.com/ChrisSub08/CVE-2026-25746_SqlInjectionVulnerabilityOpenEMR7.0.4.
Details
- CWE(s)