CVE-2020-13567
OpenEMR vulnerability analysis and mitigation

Overview

CVE-2020-13567 is a SQL injection vulnerability discovered in phpGACL 3.3.7, a PHP library that allows developers to implement permission systems via a Generic Access Control List. The vulnerability was discovered by Claudio Bozzato of Cisco Talos and was disclosed to the vendor on October 23, 2020. The vulnerability specifically affects the parentid parameter in the admin/editgroup.php file when the POST parameter action is set to 'Submit' (Talos Report).

Technical details

The vulnerability exists due to improper sanitization of the parentid parameter in admin/editgroup.php. When the POST parameter action is set to 'Submit', the parentid parameter is passed to both addgroup and editgroup functions without proper sanitization. The vulnerability allows an attacker to inject SQL commands through the parentid parameter. The issue has been assigned a CVSSv3 score of 8.8 (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) and is classified as CWE-89 (Improper Neutralization of Special Elements used in an SQL Command) (Talos Report).

Impact

A successful exploitation of this vulnerability could allow an attacker to execute arbitrary SQL commands on the underlying database. This could potentially lead to unauthorized access to sensitive data, modification of database contents, and compromise of the application's integrity (NVD).

Mitigation and workarounds

The vulnerability was patched by the vendor on January 5, 2021. Users are advised to upgrade to the patched version of phpGACL. The fix includes proper sanitization of the parentid parameter before its use in SQL queries ([Talos Report](https://talosintelligence.com/vulnerabilityreports/TALOS-2020-1179)).

Additional resources


SourceThis report was generated using AI

Related OpenEMR vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2024-22611CRITICAL9.8
  • OpenEMROpenEMR
  • cpe:2.3:a:open-emr:openemr
NoYesApr 03, 2025
CVE-2013-10044HIGH8.7
  • OpenEMROpenEMR
  • cpe:2.3:a:open-emr:openemr
NoYesAug 01, 2025
CVE-2025-43860HIGH7.6
  • OpenEMROpenEMR
  • cpe:2.3:a:open-emr:openemr
NoYesMay 23, 2025
CVE-2025-32794HIGH7.6
  • OpenEMROpenEMR
  • cpe:2.3:a:open-emr:openemr
NoYesMay 23, 2025
CVE-2025-32967MEDIUM5.4
  • OpenEMROpenEMR
  • cpe:2.3:a:open-emr:openemr
NoYesMay 23, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management