8.8

CVSS3.1

CVE-2026-4758 - WP Job Portal <= 2.4.9 - Authenticated (Subscriber+) Arbitrary File Deletion via Resume Custom File…

The WP Job Portal plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the 'WPJOBPORTALcustomfields::removeFileCustom' function in all versions up to, and including, 2.4.9. This makes it possible for authenticated attackers, with Subscriber-level…

📅 Published: March 25, 2026, 11:26 p.m. 🔄 Last Modified: March 30, 2026, 1:26 p.m.

5.4

CVSS3.1

CVE-2026-33915 - OpenEMR Missing ACL Checks on Insurance Company API Routes

OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0.3, five insurance company REST API routes are missing the `RestConfig::request_authorization_check()` call that every other data-modifying route in the standard API uses. …

📅 Published: March 25, 2026, 11:23 p.m. 🔄 Last Modified: March 27, 2026, 9:29 a.m.

7.2

CVSS3.1

CVE-2026-33914 - OpenEMR has SQL Injection in PostCalendar Category Delete

OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0.3, the PostCalendar module contains a blind SQL injection vulnerability in the `categoriesUpdate` administrative function. The `dels` POST parameter is read via `pnVarClea…

📅 Published: March 25, 2026, 11:13 p.m. 🔄 Last Modified: March 27, 2026, 9:29 a.m.

7.7

CVSS3.1

CVE-2026-33913 - OpenEMR: XInclude Injection in CCDA Import Allows Reading Arbitrary Server Files

OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0.3, an authenticated user with access to the Carecoordination module can upload a crafted CCDA document containing `<xi:include href="file:///etc/passwd" parse="text"/>` to…

📅 Published: March 25, 2026, 10:52 p.m. 🔄 Last Modified: March 27, 2026, 9:29 a.m.

5.4

CVSS3.1

CVE-2026-33912 - OpenEMR has reflected XSS in ajax_download.php via reportID parameter

OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0.3, an authenticated attacker could craft a malicious form that, when submitted by a victim, executes arbitrary JavaScript in the victim's browser session. Version 8.0.0.3 …

📅 Published: March 25, 2026, 10:51 p.m. 🔄 Last Modified: March 27, 2026, 9:29 a.m.

5.4

CVSS3.1

CVE-2026-33911 - OpenEMR vulnerable to reflected XSS in graphs.php via title parameter

OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0.3, the POST parameter `title` is reflected back in a JSON response built with `json_encode()`. Because the response is served with a `text/html` Content-Type, the browser …

📅 Published: March 25, 2026, 10:44 p.m. 🔄 Last Modified: March 27, 2026, 9:29 a.m.

7.2

CVSS3.1

CVE-2026-33910 - OpenEMR has a SQL Injection Vulnerability in patient selection

OpenEMR is a free and open source electronic health records and medical practice management application. Versions up to and including 8.0.0.2 contain a SQL injection vulnerability in the patient selection feature that can be exploited by authenticated attackers. The vulnerability exists due to insu…

📅 Published: March 25, 2026, 10:41 p.m. 🔄 Last Modified: March 27, 2026, 9:29 a.m.

5.9

CVSS3.1

CVE-2026-33909 - OpenEMR Vulnerable to SQL Injection via Unsanitized Variables in MedEx Recall/Reminder Processing

OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0.3, several variables in the MedEx recall/reminder processing code are concatenated directly into SQL queries without parameterization or type casting, enabling SQL injecti…

📅 Published: March 25, 2026, 10:35 p.m. 🔄 Last Modified: March 27, 2026, 9:29 a.m.

5.3

CVSS4.0

CVE-2026-4825 - SourceCodester Sales and Inventory System HTTP GET Parameter update_sales.php sql injection

A vulnerability was found in SourceCodester Sales and Inventory System 1.0. This affects an unknown part of the file /update_sales.php of the component HTTP GET Parameter Handler. The manipulation of the argument sid results in sql injection. The attack may be launched remotely. The exploit has bee…

📅 Published: March 25, 2026, 10:32 p.m. 🔄 Last Modified: March 30, 2026, 1:26 p.m.

8.7

CVSS3.1

CVE-2026-33348 - OpenEMR has Stored XSS in patient encounter Eye Exam form $CHRONIC2 and $CHRONIC3

OpenEMR is a free and open source electronic health records and medical practice management application. Users with the `Notes - my encounters` role can fill Eye Exam forms in patient encounters. The answers to the form are displayed on the encounter page and in the visit history for the users with…

📅 Published: March 25, 2026, 10:30 p.m. 🔄 Last Modified: March 27, 2026, 9:29 a.m.
Total resulsts: 341572
Page 114 of 34,158
« previous page » next page
Filters