Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-54495: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in MedDream MedDream PACS Premium

0
Medium
VulnerabilityCVE-2025-54495cvecve-2025-54495cwe-79
Published: Tue Jan 20 2026 (01/20/2026, 14:50:07 UTC)
Source: CVE Database V5
Vendor/Project: MedDream
Product: MedDream PACS Premium

Description

CVE-2025-54495 is a reflected cross-site scripting (XSS) vulnerability found in MedDream PACS Premium version 7. 3. 6. 870, specifically in the emailfailedjob functionality. An attacker can craft a malicious URL that, when visited by a user, executes arbitrary JavaScript code within the victim's browser context. This vulnerability requires user interaction (clicking the malicious link) but does not require authentication, and it can impact confidentiality and integrity by stealing session tokens or manipulating displayed content. The CVSS score is 6. 1 (medium severity), reflecting the moderate impact and ease of exploitation. No known exploits are currently in the wild, and no patches have been published yet. European healthcare organizations using MedDream PACS Premium are at risk, especially in countries with significant adoption of this medical imaging software.

AI-Powered Analysis

AILast updated: 01/27/2026, 20:12:55 UTC

Technical Analysis

CVE-2025-54495 is a reflected cross-site scripting vulnerability categorized under CWE-79, affecting MedDream PACS Premium version 7.3.6.870. The vulnerability resides in the emailfailedjob functionality, where user-supplied input is improperly neutralized during web page generation. This improper sanitization allows an attacker to craft a malicious URL that, when accessed by a user, causes arbitrary JavaScript code execution in the victim’s browser. This can lead to session hijacking, credential theft, or manipulation of the web interface, compromising confidentiality and integrity of the affected system. The vulnerability is exploitable remotely over the network without authentication but requires user interaction to click the malicious link. The CVSS v3.1 base score of 6.1 reflects a medium severity, with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), scope changed (S:C), and low impact on confidentiality and integrity (C:L, I:L) with no impact on availability (A:N). No patches or known exploits are currently available, indicating the need for proactive mitigation. The vulnerability affects a critical healthcare product used for medical image management, making it a significant concern for healthcare providers relying on MedDream PACS Premium for diagnostic workflows.

Potential Impact

For European organizations, particularly healthcare providers using MedDream PACS Premium, this vulnerability poses a risk to patient data confidentiality and system integrity. Successful exploitation could allow attackers to steal session cookies or credentials, enabling unauthorized access to sensitive medical images and patient information. This could lead to privacy violations, regulatory non-compliance (e.g., GDPR), and potential disruption of clinical workflows. Although availability is not directly impacted, the loss of trust and potential data breaches could have severe reputational and financial consequences. The requirement for user interaction means phishing or social engineering campaigns could be used to exploit this vulnerability, increasing the risk in environments with less security awareness. Given the critical nature of healthcare data and the increasing targeting of healthcare infrastructure by cybercriminals, this vulnerability represents a moderate but tangible threat to European healthcare entities.

Mitigation Recommendations

Organizations should immediately implement strict input validation and output encoding on all user-supplied data, especially within the emailfailedjob functionality, to prevent injection of malicious scripts. Until an official patch is released, administrators should restrict access to the vulnerable functionality where possible, such as limiting exposure to trusted networks or using web application firewalls (WAFs) to detect and block suspicious requests containing malicious payloads. Security teams should conduct user awareness training to educate staff about the risks of clicking unknown or suspicious URLs, emphasizing phishing prevention. Monitoring web server logs for unusual URL patterns targeting the emailfailedjob endpoint can help detect attempted exploitation. Additionally, organizations should prepare for rapid patch deployment once MedDream releases an update addressing this vulnerability. Regular security assessments and penetration testing focusing on web application vulnerabilities are recommended to identify and remediate similar issues proactively.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
talos
Date Reserved
2025-08-22T15:57:09.865Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 696f99d64623b1157c3aa45e

Added to database: 1/20/2026, 3:05:58 PM

Last enriched: 1/27/2026, 8:12:55 PM

Last updated: 2/5/2026, 5:28:18 PM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats