CVE-2025-58090

6.1 MEDIUM

📋 TL;DR

MedDream PACS Premium 7.3.6.870 contains reflected cross-site scripting vulnerabilities in the config.php uploaddir parameter. Attackers can craft malicious URLs that execute arbitrary JavaScript in victims' browsers when visited. This affects all users of the vulnerable version who access the application.

💻 Affected Systems

Products:
  • MedDream PACS Premium
Versions: 7.3.6.870
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the default configuration of the specified version.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal session cookies, perform actions as authenticated users, redirect to malicious sites, or install malware on client systems.

🟠

Likely Case

Session hijacking, credential theft, or defacement of the application interface through injected content.

🟢

If Mitigated

Limited impact if proper input validation and output encoding are implemented, though some client-side disruption may still occur.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Reflected XSS typically requires user interaction (clicking malicious link) but is straightforward to exploit once crafted.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://talosintelligence.com/vulnerability_reports/TALOS-2025-2271

Restart Required: No

Instructions:

1. Check vendor website for security updates. 2. Apply any available patches for MedDream PACS Premium. 3. Verify the fix by testing the uploaddir parameter.

🔧 Temporary Workarounds

Web Application Firewall (WAF)

all

Deploy a WAF with XSS protection rules to block malicious requests.

Input Validation Filter

all

Implement server-side input validation to sanitize the uploaddir parameter.

🧯 If You Can't Patch

  • Restrict access to the application using network segmentation or VPN.
  • Implement Content Security Policy (CSP) headers to mitigate script execution.

🔍 How to Verify

Check if Vulnerable:

Test the config.php uploaddir parameter with XSS payloads like <script>alert('XSS')</script> and observe if script executes.

Check Version:

Check application version in admin interface or configuration files.

Verify Fix Applied:

Retest with XSS payloads after applying fixes; ensure no script execution occurs and input is properly sanitized.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests to config.php with suspicious parameters containing script tags or JavaScript code.

Network Indicators:

  • Unusual outbound connections from client browsers after visiting application URLs.

SIEM Query:

source="web_logs" AND uri="*config.php*" AND (param="*<script>*" OR param="*javascript:*")

🔗 References

📤 Share & Export