CVE-2025-46270

6.1 MEDIUM

📋 TL;DR

A reflected cross-site scripting vulnerability in MedDream PACS Premium allows attackers to execute arbitrary JavaScript code by tricking users into clicking malicious URLs. This affects healthcare organizations using the vulnerable version of the medical imaging software. The vulnerability enables client-side attacks against authenticated users.

💻 Affected Systems

Products:
  • MedDream PACS Premium
Versions: 7.3.6.870
Operating Systems: All platforms running MedDream PACS
Default Config Vulnerable: ⚠️ Yes
Notes: Requires user interaction (clicking malicious link) and authenticated access to the fetchPriorStudies functionality.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal session cookies, perform actions as authenticated users, redirect to malicious sites, or install malware on user systems.

🟠

Likely Case

Session hijacking, credential theft, or redirection to phishing sites targeting healthcare staff.

🟢

If Mitigated

Limited impact if proper input validation and output encoding are implemented, though user interaction is still required.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires crafting malicious URLs and social engineering to get users to click them.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not available

Vendor Advisory: Not available

Restart Required: No

Instructions:

1. Contact MedDream vendor for patch information. 2. Apply vendor-provided security update. 3. Test in non-production environment first.

🔧 Temporary Workarounds

Input Validation and Output Encoding

all

Implement proper input validation and output encoding for the fetchPriorStudies parameter

Implement server-side validation of URL parameters
Apply HTML entity encoding to user-controlled output

Content Security Policy

all

Implement strict Content Security Policy headers to mitigate XSS impact

Add Content-Security-Policy header with script-src directives

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block XSS payloads
  • Restrict access to the vulnerable endpoint using network segmentation

🔍 How to Verify

Check if Vulnerable:

Test the fetchPriorStudies endpoint with XSS payloads in URL parameters

Check Version:

Check MedDream PACS version in administration interface or configuration files

Verify Fix Applied:

Verify that XSS payloads are properly sanitized and do not execute

📡 Detection & Monitoring

Log Indicators:

  • Unusual URL parameters containing script tags or JavaScript in fetchPriorStudies requests
  • Multiple failed XSS attempts

Network Indicators:

  • HTTP requests with suspicious parameters to fetchPriorStudies endpoint
  • URLs containing encoded JavaScript payloads

SIEM Query:

source="web_logs" AND uri="*fetchPriorStudies*" AND (param="*<script>*" OR param="*javascript:*")

🔗 References

📤 Share & Export