CVE-2013-10044
Severity CVSS v4.0:
HIGH
Type:
CWE-89
SQL Injection
Publication date:
01/08/2025
Last modified:
26/11/2025
Description
An authenticated SQL injection vulnerability exists in OpenEMR ≤ 4.1.1 Patch 14 that allows a low-privileged attacker to extract administrator credentials and subsequently escalate privileges. Once elevated, the attacker can exploit an unrestricted file upload flaw to achieve remote code execution, resulting in full compromise of the application and its host system.
Impact
Base Score 4.0
8.70
Severity 4.0
HIGH
Base Score 3.x
8.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:open-emr:openemr:*:*:*:*:*:*:*:* | 4.1.1 (including) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://github.com/openemr/openemr
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/unix/webapp/openemr_sqli_privesc_upload.rb
- https://www.exploit-db.com/exploits/28329
- https://www.exploit-db.com/exploits/28408
- https://www.open-emr.org/
- https://www.vulncheck.com/advisories/openemr-sqli-priv-esc-rce
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/unix/webapp/openemr_sqli_privesc_upload.rb
- https://www.exploit-db.com/exploits/28329
- https://www.exploit-db.com/exploits/28408



