CVE-2025-4411: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Dataprom Informatics PACS-ACSS
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Dataprom Informatics PACS-ACSS allows Cross-Site Scripting (XSS).This issue affects PACS-ACSS: before 16.05.2025.
AI Analysis
Technical Summary
CVE-2025-4411 is a medium-severity vulnerability classified under CWE-79, which pertains to improper neutralization of input during web page generation, commonly known as Cross-Site Scripting (XSS). This vulnerability affects Dataprom Informatics' PACS-ACSS product versions prior to 16.05.2025. The flaw arises because the application fails to properly sanitize or encode user-supplied input before including it in dynamically generated web pages. As a result, an attacker can inject malicious scripts into the web interface of PACS-ACSS, which will then be executed in the browsers of users who view the affected pages. The CVSS v3.1 base score is 6.5, indicating a medium severity level. The vector string (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L) shows that the vulnerability is remotely exploitable over the network without requiring any privileges or user interaction. The impact primarily affects confidentiality (partial data disclosure) and availability (potential service disruption), but does not directly compromise integrity. No known exploits are currently reported in the wild, and no patches have been linked yet. PACS-ACSS is a specialized healthcare software product, likely used for managing medical imaging and associated clinical workflows. The vulnerability could allow attackers to execute arbitrary scripts in the context of the web application, potentially leading to session hijacking, information disclosure, or denial of service through crafted payloads. Given the nature of the product, exploitation could disrupt healthcare operations or expose sensitive patient data.
Potential Impact
For European organizations, especially healthcare providers and medical institutions using PACS-ACSS, this vulnerability poses a risk to patient data confidentiality and system availability. Exploitation could enable attackers to steal session tokens or other sensitive information accessible via the web interface, potentially leading to unauthorized access to patient records or administrative functions. Additionally, injected scripts could be used to launch further attacks such as phishing or malware delivery within the trusted healthcare environment. Disruption of PACS-ACSS availability could delay critical diagnostic workflows, impacting patient care. The medium severity rating reflects that while the vulnerability does not allow full system compromise or data integrity manipulation, the confidentiality and availability impacts are significant in a healthcare context. European healthcare organizations are subject to strict data protection regulations such as GDPR, and any data leakage or service disruption could result in legal and reputational consequences. The absence of required privileges or user interaction lowers the barrier for exploitation, increasing the risk profile.
Mitigation Recommendations
Organizations should prioritize updating PACS-ACSS to version 16.05.2025 or later once the vendor releases a patch addressing this XSS vulnerability. Until a patch is available, implement web application firewalls (WAFs) with custom rules to detect and block typical XSS attack payloads targeting the PACS-ACSS interface. Conduct thorough input validation and output encoding on any user-supplied data within the application environment if customization or integration is possible. Restrict access to the PACS-ACSS web interface to trusted networks and authenticated users only, using network segmentation and VPNs to reduce exposure. Monitor web server and application logs for unusual requests or error patterns indicative of attempted XSS exploitation. Educate healthcare staff about the risks of clicking suspicious links or submitting unexpected input through the PACS-ACSS interface. Finally, prepare incident response plans specific to web application attacks to quickly contain and remediate any exploitation attempts.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Belgium
CVE-2025-4411: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Dataprom Informatics PACS-ACSS
Description
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Dataprom Informatics PACS-ACSS allows Cross-Site Scripting (XSS).This issue affects PACS-ACSS: before 16.05.2025.
AI-Powered Analysis
Technical Analysis
CVE-2025-4411 is a medium-severity vulnerability classified under CWE-79, which pertains to improper neutralization of input during web page generation, commonly known as Cross-Site Scripting (XSS). This vulnerability affects Dataprom Informatics' PACS-ACSS product versions prior to 16.05.2025. The flaw arises because the application fails to properly sanitize or encode user-supplied input before including it in dynamically generated web pages. As a result, an attacker can inject malicious scripts into the web interface of PACS-ACSS, which will then be executed in the browsers of users who view the affected pages. The CVSS v3.1 base score is 6.5, indicating a medium severity level. The vector string (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L) shows that the vulnerability is remotely exploitable over the network without requiring any privileges or user interaction. The impact primarily affects confidentiality (partial data disclosure) and availability (potential service disruption), but does not directly compromise integrity. No known exploits are currently reported in the wild, and no patches have been linked yet. PACS-ACSS is a specialized healthcare software product, likely used for managing medical imaging and associated clinical workflows. The vulnerability could allow attackers to execute arbitrary scripts in the context of the web application, potentially leading to session hijacking, information disclosure, or denial of service through crafted payloads. Given the nature of the product, exploitation could disrupt healthcare operations or expose sensitive patient data.
Potential Impact
For European organizations, especially healthcare providers and medical institutions using PACS-ACSS, this vulnerability poses a risk to patient data confidentiality and system availability. Exploitation could enable attackers to steal session tokens or other sensitive information accessible via the web interface, potentially leading to unauthorized access to patient records or administrative functions. Additionally, injected scripts could be used to launch further attacks such as phishing or malware delivery within the trusted healthcare environment. Disruption of PACS-ACSS availability could delay critical diagnostic workflows, impacting patient care. The medium severity rating reflects that while the vulnerability does not allow full system compromise or data integrity manipulation, the confidentiality and availability impacts are significant in a healthcare context. European healthcare organizations are subject to strict data protection regulations such as GDPR, and any data leakage or service disruption could result in legal and reputational consequences. The absence of required privileges or user interaction lowers the barrier for exploitation, increasing the risk profile.
Mitigation Recommendations
Organizations should prioritize updating PACS-ACSS to version 16.05.2025 or later once the vendor releases a patch addressing this XSS vulnerability. Until a patch is available, implement web application firewalls (WAFs) with custom rules to detect and block typical XSS attack payloads targeting the PACS-ACSS interface. Conduct thorough input validation and output encoding on any user-supplied data within the application environment if customization or integration is possible. Restrict access to the PACS-ACSS web interface to trusted networks and authenticated users only, using network segmentation and VPNs to reduce exposure. Monitor web server and application logs for unusual requests or error patterns indicative of attempted XSS exploitation. Educate healthcare staff about the risks of clicking suspicious links or submitting unexpected input through the PACS-ACSS interface. Finally, prepare incident response plans specific to web application attacks to quickly contain and remediate any exploitation attempts.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- TR-CERT
- Date Reserved
- 2025-05-07T07:44:01.087Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6880d66cad5a09ad0025c7a0
Added to database: 7/23/2025, 12:32:44 PM
Last enriched: 7/23/2025, 12:47:49 PM
Last updated: 7/24/2025, 12:33:57 AM
Views: 3
Related Threats
CVE-2025-8115: Cross Site Scripting in PHPGurukul Taxi Stand Management System
MediumCVE-2025-5039: CWE-426 Untrusted Search Path in Autodesk RealDWG
HighCVE-2025-45702: n/a
HighCVE-2025-46996: Cross-site Scripting (Stored XSS) (CWE-79) in Adobe Adobe Experience Manager
MediumCVE-2025-46993: Cross-site Scripting (Stored XSS) (CWE-79) in Adobe Adobe Experience Manager
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.