CVE-2025-54853

6.1 MEDIUM

📋 TL;DR

A reflected cross-site scripting vulnerability in MedDream PACS Premium allows attackers to execute arbitrary JavaScript code by tricking users into clicking malicious URLs. This affects healthcare organizations using MedDream PACS Premium 7.3.6.870 for medical imaging. Attackers can steal session cookies, redirect users, or perform actions on their behalf.

💻 Affected Systems

Products:
  • MedDream PACS Premium
Versions: 7.3.6.870
Operating Systems: All operating systems where MedDream PACS Premium is installed
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability is in the modifyUser functionality; any system with this version exposed to user input is vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker steals administrator session cookies, gains full system access, exfiltrates patient medical data, and potentially modifies medical images or records.

🟠

Likely Case

Attacker steals user session cookies to access patient data, perform unauthorized actions, or redirect to phishing sites.

🟢

If Mitigated

With proper input validation and output encoding, the vulnerability is prevented; with web application firewalls, malicious requests are blocked.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires user interaction (clicking a malicious link), but crafting the URL is straightforward.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified

Vendor Advisory: Not available

Restart Required: No

Instructions:

1. Contact MedDream vendor for patch or update. 2. Apply any available security updates. 3. Test in a non-production environment first.

🔧 Temporary Workarounds

Implement Input Validation and Output Encoding

all

Sanitize user inputs in the modifyUser functionality to prevent XSS payloads.

Not applicable - requires code changes

Deploy Web Application Firewall (WAF)

all

Configure WAF rules to block XSS patterns in URLs and parameters.

Not applicable - configuration dependent

🧯 If You Can't Patch

  • Restrict access to the MedDream PACS interface to trusted networks only.
  • Implement Content Security Policy (CSP) headers to mitigate script execution.

🔍 How to Verify

Check if Vulnerable:

Test the modifyUser functionality with XSS payloads in URL parameters; if scripts execute, the system is vulnerable.

Check Version:

Check the MedDream PACS interface or configuration files for version information; typically in admin panel or about section.

Verify Fix Applied:

Retest with XSS payloads after applying fixes; ensure scripts do not execute and inputs are properly sanitized.

📡 Detection & Monitoring

Log Indicators:

  • Unusual URL parameters with script tags or JavaScript code in access logs.
  • Multiple failed attempts to access modifyUser with suspicious inputs.

Network Indicators:

  • HTTP requests to modifyUser endpoint containing <script> or javascript: in parameters.
  • Traffic patterns indicating phishing attempts targeting the system.

SIEM Query:

source="web_logs" AND uri="*modifyUser*" AND (param="*<script>*" OR param="*javascript:*")

🔗 References

📤 Share & Export