{"id":"CVE-2023-22974","details":"A Path Traversal in setup.php in OpenEMR \u003c 7.0.0 allows remote unauthenticated users to read arbitrary files by controlling a connection to an attacker-controlled MySQL server.","modified":"2026-03-14T11:58:38.995419Z","published":"2023-02-22T21:15:11.443Z","references":[{"type":"FIX","url":"https://www.open-emr.org/wiki/index.php/OpenEMR_Patches#7.0.0_Patch_.2811.2F30.2F22.29"},{"type":"EVIDENCE","url":"https://www.sonarsource.com/blog/openemr-remote-code-execution-in-your-healthcare-system/"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/openemr/openemr","events":[{"introduced":"0"},{"fixed":"6b904654a45fca8965a49f556d9c517384f92a2e"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"7.0.0"}]}}],"versions":["v2_7_2","v2_7_2-rc1","v2_7_2-rc2","v2_7_3-rc1","v2_8_0","v2_8_1","v2_8_2","v2_8_3","v2_9_0","v3_0_0","v3_0_1"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-22974.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}]}