First published: Mon Mar 31 2025(Updated: )
OpenEMR is a free and open source electronic health records and medical practice management application. An Out-of-Band Server-Side Request Forgery (OOB SSRF) vulnerability was identified in OpenEMR, allowing an attacker to force the server to make unauthorized requests to external or internal resources. this attack does not return a direct response but can be exploited through DNS or HTTP interactions to exfiltrate sensitive information. This vulnerability is fixed in 7.0.3.1.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
OpenEMR | <7.0.3.1 | |
OpenEMR | <7.0.3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-31117 is rated as a critical severity vulnerability due to its potential for exploitation through unauthorized external requests.
To fix CVE-2025-31117, update OpenEMR to version 7.0.3.2 or later, where the vulnerability has been addressed.
CVE-2025-31117 is caused by an Out-of-Band Server-Side Request Forgery (OOB SSRF) flaw that allows attackers to send unauthorized requests via the server.
OpenEMR versions up to and including 7.0.3.1 are affected by CVE-2025-31117.
Exploitation of CVE-2025-31117 could allow attackers to access sensitive data or perform actions on external systems without authorization.