OpenEMR is a free and open source electronic health records and medical practice management application. Prior to 8.0.0.2, the DICOM zip/export feature uses a user-supplied destination or path component when creating the zip file, without sanitizing path traversal sequences (e.g. `../`). An attacker with DICOM upload/export permission can write files outside the intended directory, potentially under the web root, leading to arbitrary file write and possibly remote code execution if PHP or other executable files can be written. Version 8.0.0.2 fixes the issue.
Use CWE-22, Open-Emr vendor hub and Openemr product page to widen CVE-2026-25928 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2026-33917, CVE-2026-34055 and CVE-2026-34056 for nearby disclosures in the same product family.