CVE-2025-58092

6.1 MEDIUM

📋 TL;DR

This vulnerability allows attackers to execute arbitrary JavaScript code in users' browsers by tricking them into clicking specially crafted malicious URLs targeting the config.php functionality in MedDream PACS Premium. It affects healthcare organizations using this medical imaging software for storing and viewing patient scans. The attack requires user interaction but can lead to session hijacking, data theft, or further system compromise.

💻 Affected Systems

Products:
  • MedDream PACS Premium
Versions: 7.3.6.870
Operating Systems: All platforms running PHP
Default Config Vulnerable: ⚠️ Yes
Notes: Specifically affects the phpexe parameter in config.php functionality. Requires the application to be accessible via web interface.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal healthcare provider credentials, access sensitive patient medical images and data, pivot to internal hospital networks, and potentially modify medical records or imaging studies.

🟠

Likely Case

Session hijacking leading to unauthorized access to patient medical images and protected health information (PHI), potentially violating HIPAA regulations.

🟢

If Mitigated

Limited to temporary session disruption or minor data exposure if proper input validation and output encoding are implemented.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Reflected XSS typically requires user interaction (clicking malicious link) but is trivial to weaponize in phishing campaigns. No authentication required to trigger the vulnerability.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://talosintelligence.com/vulnerability_reports/TALOS-2025-2271

Restart Required: No

Instructions:

1. Contact MedDream vendor for patch availability. 2. If patch available, download from official vendor portal. 3. Backup current installation. 4. Apply patch following vendor instructions. 5. Test functionality post-patch.

🔧 Temporary Workarounds

Input Validation and Output Encoding

all

Implement proper input validation for the phpexe parameter and encode all output to prevent script execution.

Modify config.php to add: htmlspecialchars($_GET['phpexe'], ENT_QUOTES, 'UTF-8');

Web Application Firewall (WAF) Rules

all

Deploy WAF rules to block malicious XSS payloads targeting the phpexe parameter.

Add WAF rule: Block requests containing <script> tags or javascript: in phpexe parameter

🧯 If You Can't Patch

  • Implement strict Content Security Policy (CSP) headers to restrict script execution
  • Isolate MedDream PACS behind VPN with strict access controls and user awareness training about phishing risks

🔍 How to Verify

Check if Vulnerable:

Test by accessing config.php with phpexe parameter containing: ?phpexe=<script>alert('XSS')</script> and check if script executes.

Check Version:

Check MedDream version in admin interface or review software documentation/configuration files.

Verify Fix Applied:

Retest with same payload after fixes; script should not execute and input should be properly encoded in output.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests to config.php with suspicious phpexe parameter values containing script tags or javascript code
  • Multiple failed login attempts following XSS payload access

Network Indicators:

  • Unusual outbound connections from MedDream server following XSS exploitation
  • Traffic patterns suggesting session hijacking

SIEM Query:

source="web_logs" AND uri="/config.php" AND query="*phpexe=*script*" OR query="*phpexe=*javascript:*"

🔗 References

📤 Share & Export