First published: Wed Mar 02 2022(Updated: )
An Insecure Direct Object Reference (IDOR) vulnerability in OpenEMR 6.0.0 allows any authenticated attacker to access and modify unauthorized areas via a crafted POST request to /modules/zend_modules/public/Installer/register.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Open-emr Openemr | =6.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-25471 is high.
The Insecure Direct Object Reference (IDOR) vulnerability in OpenEMR 6.0.0 allows any authenticated attacker to access and modify unauthorized areas via a crafted POST request to /modules/zend_modules/public/Installer/register.
An attacker can exploit CVE-2022-25471 by sending a crafted POST request to /modules/zend_modules/public/Installer/register and gaining access to and modifying unauthorized areas.
Yes, make sure to update to a version of OpenEMR that is not affected by this vulnerability.
You can find more information about CVE-2022-25471 on the OpenEMR website and the GitHub repository.