CVE-2026-33917
Published: 26 March 2026
Summary
CVE-2026-33917 is a high-severity SQL Injection (CWE-89) vulnerability in Open-Emr Openemr. Its CVSS base score is 8.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 0.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
SI-10 requires information input validation at entry points, directly addressing the insufficient input validation in the ajax_save CAMOS form that enables SQL injection.
SI-2 mandates timely flaw remediation, ensuring OpenEMR is patched to version 8.0.0.3 or later to eliminate the SQL injection vulnerability.
RA-5 vulnerability scanning would identify the SQL injection flaw in OpenEMR versions prior to 8.0.0.3 prior to exploitation.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SQL injection in web app (OpenEMR) directly enables remote exploitation of a public/internet-accessible application (T1190); arbitrary queries allow collection from the patient database (T1213.006), stored data manipulation (T1565.001), and data destruction via deletion (T1485).
NVD Description
OpenEMR is a free and open source electronic health records and medical practice management application. Versions prior to 8.0.0.3 contais a SQL injection vulnerability in the ajax_save CAMOS form that can be exploited by authenticated attackers. The vulnerability exists due…
more
to insufficient input validation in the ajax_save page in the CAMOS form. Version 8.0.0.3 patches the issue.
Deeper analysisAI
CVE-2026-33917 is a SQL injection vulnerability (CWE-89) in OpenEMR, a free and open-source electronic health records and medical practice management application. The flaw stems from insufficient input validation in the ajax_save page of the CAMOS form and affects all versions prior to 8.0.0.3.
Authenticated attackers with low privileges can exploit the vulnerability remotely over the network with low attack complexity and no user interaction required. Successful exploitation enables high-impact consequences across confidentiality, integrity, and availability (CVSS 3.1 score of 8.8: AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), allowing arbitrary SQL query execution to potentially extract, modify, or delete sensitive patient data.
OpenEMR version 8.0.0.3 fully patches the issue. Security practitioners should upgrade immediately, referencing the fix commit at https://github.com/openemr/openemr/commit/4d48821d18e4125508d8217c43b09233c7f7e17f, the release notes at https://github.com/openemr/openemr/releases/tag/v8_0_0_3, and the GitHub security advisory at https://github.com/openemr/openemr/security/advisories/GHSA-r6xq-mfwf-wgq8.
Details
- CWE(s)