Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. org.openmrs/openmrs
  4. ›
  5. GHSA-vpxm-cr3r-pjp9

GHSA-vpxm-cr3r-pjp9: General OpenMRS Security Advisory, January 2025: Penetration Testing Results and Patches

January 30, 2025

We recently underwent Penetration Testing of OpenMRS by a third-party company. Vulnerabilities were found, and fixes have been made and released. We’ve released security updates that include critical fixes, and so, we strongly recommend upgrading affected modules.

This notice applies to all OpenMRS instances. The testers used the OpenMRS v3 Reference Application (O3 RefApp); however, their findings highlighted modules commonly used in older OpenMRS applications, including the O2 RefApp.

References

  • github.com/advisories/GHSA-vpxm-cr3r-pjp9
  • github.com/openmrs/openmrs-core
  • github.com/openmrs/openmrs-core/security/advisories/GHSA-vpxm-cr3r-pjp9

Code Behaviors & Features

Detect and mitigate GHSA-vpxm-cr3r-pjp9 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 2.6.11

Fixed versions

  • 2.6.11

Solution

Upgrade to version 2.6.11 or above.

Weakness

  • CWE-209: Generation of Error Message Containing Sensitive Information
  • CWE-284: Improper Access Control
  • CWE-601: URL Redirection to Untrusted Site ('Open Redirect')
  • CWE-614: Sensitive Cookie in HTTPS Session Without 'Secure' Attribute

Source file

maven/org.openmrs/openmrs/GHSA-vpxm-cr3r-pjp9.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:06 +0000.