CVE-2025-54778

6.1 MEDIUM

📋 TL;DR

A reflected cross-site scripting vulnerability in MedDream PACS Premium allows attackers to execute arbitrary JavaScript code by tricking users into clicking malicious URLs. This affects healthcare organizations using MedDream PACS Premium 7.3.6.870 for medical imaging. Attackers can steal session cookies, redirect users, or perform actions on their behalf.

💻 Affected Systems

Products:
  • MedDream PACS Premium
Versions: 7.3.6.870
Operating Systems: All platforms running MedDream PACS Premium
Default Config Vulnerable: ⚠️ Yes
Notes: Specifically affects the existingUser functionality. Any deployment with this version is vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers steal administrator credentials, gain full system access, manipulate medical images, or exfiltrate sensitive patient data, potentially leading to medical fraud or patient harm.

🟠

Likely Case

Attackers steal user session cookies to impersonate legitimate users, access patient records, or modify system settings within the PACS interface.

🟢

If Mitigated

With proper input validation and output encoding, malicious scripts are neutralized, preventing code execution while maintaining normal system functionality.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires user interaction (clicking malicious link) but no authentication. Attack vectors include phishing emails or malicious websites.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified

Vendor Advisory: Not available

Restart Required: No

Instructions:

1. Monitor MedDream vendor website for security updates. 2. Apply patch when available. 3. Test in non-production environment first. 4. Deploy to production systems.

🔧 Temporary Workarounds

Implement Web Application Firewall (WAF)

all

Deploy WAF with XSS protection rules to block malicious payloads before reaching the application.

Input Validation Filter

all

Add server-side input validation to sanitize user-supplied parameters in the existingUser functionality.

🧯 If You Can't Patch

  • Implement Content Security Policy (CSP) headers to restrict script execution sources
  • Educate users about phishing risks and suspicious URLs

🔍 How to Verify

Check if Vulnerable:

Test the existingUser endpoint with XSS payloads like <script>alert('XSS')</script> in URL parameters and check if script executes.

Check Version:

Check MedDream PACS interface or configuration files for version information (typically in admin panel or about section).

Verify Fix Applied:

Retest with same XSS payloads after applying fixes; scripts should be properly encoded or blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unusual URL parameters containing script tags or JavaScript code
  • Multiple failed login attempts from suspicious sources

Network Indicators:

  • HTTP requests with suspicious parameters to existingUser endpoint
  • Outbound connections to unknown domains after user clicks

SIEM Query:

source="web_server" AND (url="*existingUser*" AND (param="*<script>*" OR param="*javascript:*"))

🔗 References

📤 Share & Export