CVE-2025-58088

6.1 MEDIUM

📋 TL;DR

This CVE describes reflected cross-site scripting vulnerabilities in MedDream PACS Premium's config.php functionality. Attackers can craft malicious URLs containing JavaScript payloads that execute when victims visit them, potentially stealing session cookies or performing actions on their behalf. This affects all users of MedDream PACS Premium 7.3.6.870.

💻 Affected Systems

Products:
  • MedDream PACS Premium
Versions: 7.3.6.870
Operating Systems: All platforms running MedDream PACS
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability specifically affects the archivedir parameter in config.php functionality.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator session cookies, gain full system access, pivot to internal networks, and potentially compromise patient data or install malware.

🟠

Likely Case

Attackers would steal user session cookies to impersonate legitimate users, potentially accessing sensitive patient data or performing unauthorized actions within the PACS system.

🟢

If Mitigated

With proper input validation and output encoding, the malicious scripts would be neutralized, preventing any code execution.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Reflected XSS typically requires social engineering to trick users into clicking malicious links, but exploitation itself is straightforward once a payload is crafted.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: No

Instructions:

1. Monitor MedDream vendor communications for security updates. 2. Apply any available patches immediately. 3. Verify the fix by testing the archivedir parameter with XSS payloads.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement server-side validation to sanitize the archivedir parameter, rejecting or encoding any input containing script tags or JavaScript.

Content Security Policy

all

Implement a strict Content Security Policy header to prevent inline script execution and restrict script sources.

Header set Content-Security-Policy "default-src 'self'; script-src 'self'"
Header set X-Content-Type-Options "nosniff"

🧯 If You Can't Patch

  • Implement a Web Application Firewall (WAF) with XSS protection rules to filter malicious requests.
  • Restrict access to the config.php functionality to trusted IP addresses only using network ACLs or application-level controls.

🔍 How to Verify

Check if Vulnerable:

Test the archivedir parameter by submitting payloads like <script>alert('XSS')</script> or encoded equivalents and check if they execute in the browser.

Check Version:

Check the MedDream PACS interface or configuration files for version information; typically found in admin panels or version.php files.

Verify Fix Applied:

After applying fixes, retest with the same XSS payloads to ensure they are properly sanitized or blocked and no longer execute.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests to config.php with suspicious parameters containing script tags, JavaScript functions, or encoded payloads in the archivedir parameter.
  • Unusual user agent strings or referrer headers in requests to config.php.

Network Indicators:

  • HTTP traffic to config.php with URL-encoded or obfuscated JavaScript in query parameters.
  • Patterns of requests attempting to inject script elements into archivedir parameter.

SIEM Query:

source="web_logs" AND uri="*config.php*" AND (query="*archivedir=*<script>*" OR query="*archivedir=*javascript:*")

🔗 References

📤 Share & Export