### [CVE-2018-15141](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15141) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description Directory traversal in portal/import_template.php in versions of OpenEMR before 5.0.1.4 allows a remote attacker authenticated in the patient portal to delete arbitrary files via the "docid" parameter when the mode is set to delete. ### POC #### Reference - https://www.databreaches.net/openemr-patches-serious-vulnerabilities-uncovered-by-project-insecurity/ - https://www.databreaches.net/openemr-patches-serious-vulnerabilities-uncovered-by-project-insecurity/ - https://www.exploit-db.com/exploits/45202/ - https://www.exploit-db.com/exploits/45202/ #### Github No PoCs found on GitHub currently.