CVE-2025-54157: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in MedDream MedDream PACS Premium
CVE-2025-54157 is a reflected cross-site scripting (XSS) vulnerability in MedDream PACS Premium version 7. 3. 6. 870, specifically in the encapsulatedDoc functionality. An attacker can craft a malicious URL that, when visited by a user, executes arbitrary JavaScript code in the victim's browser. This vulnerability requires user interaction (clicking the malicious link) but does not require authentication. The CVSS score is 6. 1 (medium severity) reflecting limited confidentiality and integrity impact without availability impact. No known exploits are currently reported in the wild. European healthcare organizations using MedDream PACS Premium should be aware of this risk as it could lead to session hijacking, phishing, or unauthorized actions within the PACS web interface.
AI Analysis
Technical Summary
CVE-2025-54157 is a reflected cross-site scripting (XSS) vulnerability identified in MedDream PACS Premium version 7.3.6.870, a medical imaging software widely used for managing and viewing DICOM images. The vulnerability exists in the encapsulatedDoc functionality, where user-supplied input is improperly neutralized during web page generation, allowing an attacker to inject arbitrary JavaScript code via a specially crafted URL. When a victim clicks this malicious URL, the injected script executes in the context of the victim's browser session, potentially enabling actions such as session hijacking, credential theft, or unauthorized commands within the PACS web application. The vulnerability has a CVSS 3.1 base score of 6.1, indicating medium severity, with an attack vector of network (remote), low attack complexity, no privileges required, but requiring user interaction. The scope is changed, meaning the vulnerability affects resources beyond the initially vulnerable component. Confidentiality and integrity impacts are low, and availability is not affected. No public exploits have been reported yet, but the presence of this vulnerability in a critical healthcare system poses a significant risk. The lack of an official patch at the time of publication necessitates immediate mitigation efforts by affected organizations. This vulnerability highlights the importance of secure coding practices, especially input validation and output encoding, in web applications handling sensitive medical data.
Potential Impact
For European organizations, particularly healthcare providers using MedDream PACS Premium, this vulnerability could lead to unauthorized access to patient imaging data and manipulation of the PACS interface through injected scripts. Although the direct impact on availability is none, the confidentiality and integrity of sensitive medical information could be compromised, potentially violating GDPR and other data protection regulations. Attackers could leverage this vulnerability to conduct phishing attacks, steal session cookies, or perform unauthorized actions on behalf of legitimate users, undermining trust in healthcare IT systems. The risk is heightened in environments where users are less trained to recognize phishing attempts or where multi-factor authentication is not enforced. Additionally, exploitation could facilitate lateral movement within hospital networks, increasing the overall security risk. The medium severity score reflects these concerns but also the requirement for user interaction limits automated exploitation. Nonetheless, the sensitive nature of healthcare data and regulatory implications make this a critical concern for European healthcare institutions.
Mitigation Recommendations
1. Apply vendor patches immediately once they become available to address the vulnerability in the encapsulatedDoc functionality. 2. Until patches are released, implement web application firewall (WAF) rules to detect and block malicious payloads targeting the vulnerable parameter. 3. Enforce strict input validation and output encoding on all user-supplied data within the PACS web interface to prevent script injection. 4. Educate healthcare staff and users about the risks of clicking on unsolicited or suspicious URLs, emphasizing phishing awareness. 5. Implement multi-factor authentication (MFA) for access to the PACS system to reduce the impact of session hijacking. 6. Monitor web server logs and network traffic for unusual patterns indicative of attempted exploitation. 7. Segment the PACS network environment to limit lateral movement if a compromise occurs. 8. Conduct regular security assessments and penetration testing focused on web application vulnerabilities. 9. Review and harden browser security settings and consider Content Security Policy (CSP) headers to restrict script execution. 10. Maintain up-to-date backups of PACS data to ensure recovery in case of compromise.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden
CVE-2025-54157: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in MedDream MedDream PACS Premium
Description
CVE-2025-54157 is a reflected cross-site scripting (XSS) vulnerability in MedDream PACS Premium version 7. 3. 6. 870, specifically in the encapsulatedDoc functionality. An attacker can craft a malicious URL that, when visited by a user, executes arbitrary JavaScript code in the victim's browser. This vulnerability requires user interaction (clicking the malicious link) but does not require authentication. The CVSS score is 6. 1 (medium severity) reflecting limited confidentiality and integrity impact without availability impact. No known exploits are currently reported in the wild. European healthcare organizations using MedDream PACS Premium should be aware of this risk as it could lead to session hijacking, phishing, or unauthorized actions within the PACS web interface.
AI-Powered Analysis
Technical Analysis
CVE-2025-54157 is a reflected cross-site scripting (XSS) vulnerability identified in MedDream PACS Premium version 7.3.6.870, a medical imaging software widely used for managing and viewing DICOM images. The vulnerability exists in the encapsulatedDoc functionality, where user-supplied input is improperly neutralized during web page generation, allowing an attacker to inject arbitrary JavaScript code via a specially crafted URL. When a victim clicks this malicious URL, the injected script executes in the context of the victim's browser session, potentially enabling actions such as session hijacking, credential theft, or unauthorized commands within the PACS web application. The vulnerability has a CVSS 3.1 base score of 6.1, indicating medium severity, with an attack vector of network (remote), low attack complexity, no privileges required, but requiring user interaction. The scope is changed, meaning the vulnerability affects resources beyond the initially vulnerable component. Confidentiality and integrity impacts are low, and availability is not affected. No public exploits have been reported yet, but the presence of this vulnerability in a critical healthcare system poses a significant risk. The lack of an official patch at the time of publication necessitates immediate mitigation efforts by affected organizations. This vulnerability highlights the importance of secure coding practices, especially input validation and output encoding, in web applications handling sensitive medical data.
Potential Impact
For European organizations, particularly healthcare providers using MedDream PACS Premium, this vulnerability could lead to unauthorized access to patient imaging data and manipulation of the PACS interface through injected scripts. Although the direct impact on availability is none, the confidentiality and integrity of sensitive medical information could be compromised, potentially violating GDPR and other data protection regulations. Attackers could leverage this vulnerability to conduct phishing attacks, steal session cookies, or perform unauthorized actions on behalf of legitimate users, undermining trust in healthcare IT systems. The risk is heightened in environments where users are less trained to recognize phishing attempts or where multi-factor authentication is not enforced. Additionally, exploitation could facilitate lateral movement within hospital networks, increasing the overall security risk. The medium severity score reflects these concerns but also the requirement for user interaction limits automated exploitation. Nonetheless, the sensitive nature of healthcare data and regulatory implications make this a critical concern for European healthcare institutions.
Mitigation Recommendations
1. Apply vendor patches immediately once they become available to address the vulnerability in the encapsulatedDoc functionality. 2. Until patches are released, implement web application firewall (WAF) rules to detect and block malicious payloads targeting the vulnerable parameter. 3. Enforce strict input validation and output encoding on all user-supplied data within the PACS web interface to prevent script injection. 4. Educate healthcare staff and users about the risks of clicking on unsolicited or suspicious URLs, emphasizing phishing awareness. 5. Implement multi-factor authentication (MFA) for access to the PACS system to reduce the impact of session hijacking. 6. Monitor web server logs and network traffic for unusual patterns indicative of attempted exploitation. 7. Segment the PACS network environment to limit lateral movement if a compromise occurs. 8. Conduct regular security assessments and penetration testing focused on web application vulnerabilities. 9. Review and harden browser security settings and consider Content Security Policy (CSP) headers to restrict script execution. 10. Maintain up-to-date backups of PACS data to ensure recovery in case of compromise.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- talos
- Date Reserved
- 2025-08-22T15:58:08.597Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 696f99d64623b1157c3aa45b
Added to database: 1/20/2026, 3:05:58 PM
Last enriched: 1/27/2026, 8:12:42 PM
Last updated: 2/5/2026, 5:06:34 PM
Views: 23
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.