{"id":"CVE-2025-29789","summary":"OpenEMR Has Directory Traversal in Load Code feature","details":"OpenEMR is a free and open source electronic health records and medical practice management application. Versions prior to 7.3.0 are vulnerable to Directory Traversal in the Load Code feature. Version 7.3.0 contains a patch for the issue.","aliases":["GHSA-ffpq-2wqj-v8ff"],"modified":"2026-04-10T05:24:33.895656Z","published":"2025-03-25T20:29:29.892Z","database_specific":{"cwe_ids":["CWE-23"],"cna_assigner":"GitHub_M","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/29xxx/CVE-2025-29789.json"},"references":[{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/29xxx/CVE-2025-29789.json"},{"type":"ADVISORY","url":"https://github.com/openemr/openemr/security/advisories/GHSA-ffpq-2wqj-v8ff"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-29789"},{"type":"FIX","url":"https://github.com/openemr/openemr/commit/ef3bb7f84ebe8ef54d55416e587ec2fefd065489"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/openemr/openemr","events":[{"introduced":"0"},{"fixed":"42a1c2a6f8dadd7c73da5cf4c06fa0d1ce8b7b98"},{"fixed":"ef3bb7f84ebe8ef54d55416e587ec2fefd065489"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"7.0.3"}]}}],"versions":["v2_7_2","v2_7_2-rc1","v2_7_2-rc2","v2_7_3-rc1","v2_8_0","v2_8_1","v2_8_2","v2_8_3","v2_9_0","v3_0_0","v3_0_1"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-29789.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V4","score":"CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:A/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N"}]}