CVE-2026-34051

Broken Access Control in OpenEMR Import/Export functionality before 8.0.0.3. Unauthorized users can perform direct requests to trigger data extraction and manipulation despite UI restrictions.

Verified by Precogs Threat Research
Last Updated: Mar 26, 2026
Base Score
5.4MEDIUM

Executive Summary

CVE-2026-34051 is a medium severity vulnerability affecting appsec. It is classified as CWE-285. Ensure your systems and dependencies are patched immediately to mitigate exposure risks.

Precogs AI Insight

"Precogs AI maps educational vulnerabilities to their root CWE weakness patterns, enabling developers to understand the fundamental code-level causes and prevent entire classes of vulnerabilities."

Exploit Probability
Low (<10%)
Public POC
Undisclosed
Exploit Probability
Low (<10%)
Public POC
Available
Affected Assets
appsecCWE-285

📚 CVE-2026-34051: Broken Access Control in OpenEMR Import/Export functionality before 8.0.0.3. Unauthorized users can perform direct requests to trigger data extraction and manipulation despite UI restrictions.

This vulnerability, identified as CVE-2026-34051, represents a significant security risk for organizations utilizing the affected software. Precogs AI analysis highlights the recurring pattern of CWE-285 weaknesses in complex application ecosystems.

Risk Assessment

MetricValue
CVSS Base Score5.4 (MEDIUM)
Category📚 Educational — Foundational Learning
Primary CWECWE-285
SourceNVD

Precogs AI Analysis

Precogs AI maps educational vulnerabilities to their root CWE weakness patterns, enabling developers to understand the fundamental code-level causes and prevent entire classes of vulnerabilities.

The pattern observed in CVE-2026-34051 illustrates the critical importance of robust input validation and authorization checks. For instance, the Broken Access Control in OpenEMR Import/Export functionality before 8 demonstrates how small gaps in logic can lead to significant data exposure or system compromise.

Precogs AI recommends a defense-in-depth approach:

  1. Automated Scanning: Use Precogs AI to identify similar patterns across your codebase.
  2. Context-Aware Validation: Move beyond simple regex to semantic validation of sensitive parameters.
  3. Least Privilege: Ensure all endpoints enforce strict authorization checks based on the authenticated user's role.

Remediation & Prevention

Immediate Action

  • Patch: Upgrade OpenEMR / SourceCodester / WP Job Portal to the latest verified version that addresses this vulnerability.
  • Verify: Audit application logs for any signs of exploitation prior to the patch application.

Future Prevention

  • Implement rigorous code review processes focusing on common web vulnerabilities.
  • Integrate automated security testing into the CI/CD pipeline.

References

Related Vulnerabilitiesvia CWE-285

CVE-2026-340567.7 HIGH

Broken Access Control in OpenEMR up to 8.0.0.3 allows low-privilege users to view and download eRx error logs. This flaw compromises confidentiality by exposing sensitive patient information.

CWE-285
CVE-2026-331869.1 CRITICAL

gRPC-Go is the Go language implementation of gRPC.

CWE-285
CVE-2026-318368.1 HIGH

Checkmate is an open-source, self-hosted tool designed to track and monitor server hardware, uptime, response times, and incidents in real-time with beautiful visualizations.

CWE-269CWE-285
CVE-2026-318690 UNKNOWN

Discourse is an open-source discussion platform.

CWE-200CWE-285CWE-639
CVE-2026-326927.6 HIGH

An authorization bypass vulnerability in the Vault secrets back-end implementation of Juju versions 3.

CWE-285
CVE-2026-218866.5 MEDIUM

OpenCTI is an open source platform for managing cyber threat intelligence knowledge and observables.

CWE-285CWE-566CWE-915