CVE-2025-44000

6.1 MEDIUM

📋 TL;DR

A reflected cross-site scripting vulnerability in MedDream PACS Premium allows attackers to execute arbitrary JavaScript code by tricking users into clicking malicious URLs. This affects healthcare organizations using the vulnerable version of this medical imaging software. Attackers could steal session cookies, redirect users, or perform actions on their behalf.

💻 Affected Systems

Products:
  • MedDream PACS Premium
Versions: 7.3.6.870
Operating Systems: All platforms running MedDream PACS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the sendOruReport functionality. Requires user interaction (clicking malicious link).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker steals administrator session cookies, gains full system access, exfiltrates patient medical data, and potentially modifies medical images or reports.

🟠

Likely Case

Attacker steals user session cookies to access patient data, performs phishing attacks, or redirects users to malicious sites.

🟢

If Mitigated

Limited impact due to proper input validation, output encoding, and Content Security Policy preventing script execution.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple reflected XSS requiring user to click crafted URL. No authentication required to trigger vulnerability.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://talosintelligence.com/vulnerability_reports/TALOS-2025-2270

Restart Required: No

Instructions:

1. Contact MedDream vendor for patch information. 2. Apply vendor-provided patch. 3. Test sendOruReport functionality after patching.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement server-side input validation to sanitize user input in sendOruReport parameters

Implement regex filtering for script tags and JavaScript events in URL parameters

Output Encoding

all

Apply proper output encoding to all user-controlled data in sendOruReport responses

Use HTML entity encoding for all dynamic content in sendOruReport output

🧯 If You Can't Patch

  • Implement Web Application Firewall (WAF) with XSS protection rules
  • Deploy Content Security Policy (CSP) headers to restrict script execution

🔍 How to Verify

Check if Vulnerable:

Test sendOruReport endpoint with XSS payloads like <script>alert('XSS')</script> in URL parameters

Check Version:

Check MedDream PACS version in administration interface or configuration files

Verify Fix Applied:

Retest with same XSS payloads and verify scripts do not execute

📡 Detection & Monitoring

Log Indicators:

  • Unusual URL parameters containing script tags or JavaScript in sendOruReport requests
  • Multiple failed XSS attempts

Network Indicators:

  • HTTP requests to sendOruReport with suspicious parameters
  • External JavaScript loading from unexpected sources

SIEM Query:

source="web_logs" AND uri="*sendOruReport*" AND (param="*<script>*" OR param="*javascript:*")

🔗 References

📤 Share & Export