CVE-2025-54814

6.1 MEDIUM

📋 TL;DR

A reflected cross-site scripting vulnerability in MedDream PACS Premium allows attackers to execute arbitrary JavaScript code by tricking users into clicking malicious URLs. This affects healthcare organizations using MedDream PACS Premium 7.3.6.870 for medical imaging. Attackers can steal session cookies, redirect users, or perform actions on their behalf.

💻 Affected Systems

Products:
  • MedDream PACS Premium
Versions: 7.3.6.870
Operating Systems: All platforms running MedDream PACS Premium
Default Config Vulnerable: ⚠️ Yes
Notes: Specifically affects the modifyAutopurgeFilter functionality. Requires user interaction (clicking malicious link).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers steal administrator credentials, gain full system access, and potentially compromise patient medical data and imaging systems.

🟠

Likely Case

Attackers steal user session cookies to impersonate legitimate users, access patient data, or modify system settings.

🟢

If Mitigated

Limited impact with proper input validation, output encoding, and Content Security Policy headers in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Reflected XSS typically requires social engineering but is technically simple to exploit once the vulnerable parameter is identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: No

Instructions:

1. Contact MedDream vendor for patch availability. 2. Apply vendor-provided patch when available. 3. Test in non-production environment first.

🔧 Temporary Workarounds

Implement WAF Rules

all

Configure web application firewall to block XSS payloads targeting modifyAutopurgeFilter parameter

Content Security Policy

all

Implement strict CSP headers to prevent inline script execution

Content-Security-Policy: script-src 'self'

🧯 If You Can't Patch

  • Implement input validation and output encoding for modifyAutopurgeFilter parameter
  • Restrict access to MedDream PACS to trusted networks only

🔍 How to Verify

Check if Vulnerable:

Test modifyAutopurgeFilter parameter with XSS payloads like <script>alert('test')</script> and check if script executes

Check Version:

Check MedDream PACS version in administration interface or configuration files

Verify Fix Applied:

Retest with same XSS payloads and verify scripts no longer execute

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests containing script tags or JavaScript in modifyAutopurgeFilter parameter
  • Unusual parameter values in modifyAutopurgeFilter requests

Network Indicators:

  • HTTP requests with suspicious parameters containing JavaScript code
  • Traffic patterns showing XSS payload delivery

SIEM Query:

source="web_logs" AND (modifyAutopurgeFilter CONTAINS "<script>" OR modifyAutopurgeFilter CONTAINS "javascript:")

🔗 References

📤 Share & Export