CVE-2025-54495: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in MedDream MedDream PACS Premium
CVE-2025-54495 is a reflected cross-site scripting (XSS) vulnerability found in MedDream PACS Premium version 7. 3. 6. 870, specifically in the emailfailedjob functionality. An attacker can craft a malicious URL that, when visited by a user, executes arbitrary JavaScript code within the victim's browser context. This vulnerability requires user interaction (clicking the malicious link) but does not require authentication, and it can impact confidentiality and integrity by stealing session tokens or manipulating displayed content. The CVSS score is 6. 1 (medium severity), reflecting the moderate impact and ease of exploitation. No known exploits are currently in the wild, and no patches have been published yet. European healthcare organizations using MedDream PACS Premium are at risk, especially in countries with significant adoption of this medical imaging software.
AI Analysis
Technical Summary
CVE-2025-54495 is a reflected cross-site scripting vulnerability categorized under CWE-79, affecting MedDream PACS Premium version 7.3.6.870. The vulnerability resides in the emailfailedjob functionality, where user-supplied input is improperly neutralized during web page generation. This improper sanitization allows an attacker to craft a malicious URL that, when accessed by a user, causes arbitrary JavaScript code execution in the victim’s browser. This can lead to session hijacking, credential theft, or manipulation of the web interface, compromising confidentiality and integrity of the affected system. The vulnerability is exploitable remotely over the network without authentication but requires user interaction to click the malicious link. The CVSS v3.1 base score of 6.1 reflects a medium severity, with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), scope changed (S:C), and low impact on confidentiality and integrity (C:L, I:L) with no impact on availability (A:N). No patches or known exploits are currently available, indicating the need for proactive mitigation. The vulnerability affects a critical healthcare product used for medical image management, making it a significant concern for healthcare providers relying on MedDream PACS Premium for diagnostic workflows.
Potential Impact
For European organizations, particularly healthcare providers using MedDream PACS Premium, this vulnerability poses a risk to patient data confidentiality and system integrity. Successful exploitation could allow attackers to steal session cookies or credentials, enabling unauthorized access to sensitive medical images and patient information. This could lead to privacy violations, regulatory non-compliance (e.g., GDPR), and potential disruption of clinical workflows. Although availability is not directly impacted, the loss of trust and potential data breaches could have severe reputational and financial consequences. The requirement for user interaction means phishing or social engineering campaigns could be used to exploit this vulnerability, increasing the risk in environments with less security awareness. Given the critical nature of healthcare data and the increasing targeting of healthcare infrastructure by cybercriminals, this vulnerability represents a moderate but tangible threat to European healthcare entities.
Mitigation Recommendations
Organizations should immediately implement strict input validation and output encoding on all user-supplied data, especially within the emailfailedjob functionality, to prevent injection of malicious scripts. Until an official patch is released, administrators should restrict access to the vulnerable functionality where possible, such as limiting exposure to trusted networks or using web application firewalls (WAFs) to detect and block suspicious requests containing malicious payloads. Security teams should conduct user awareness training to educate staff about the risks of clicking unknown or suspicious URLs, emphasizing phishing prevention. Monitoring web server logs for unusual URL patterns targeting the emailfailedjob endpoint can help detect attempted exploitation. Additionally, organizations should prepare for rapid patch deployment once MedDream releases an update addressing this vulnerability. Regular security assessments and penetration testing focusing on web application vulnerabilities are recommended to identify and remediate similar issues proactively.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Belgium
CVE-2025-54495: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in MedDream MedDream PACS Premium
Description
CVE-2025-54495 is a reflected cross-site scripting (XSS) vulnerability found in MedDream PACS Premium version 7. 3. 6. 870, specifically in the emailfailedjob functionality. An attacker can craft a malicious URL that, when visited by a user, executes arbitrary JavaScript code within the victim's browser context. This vulnerability requires user interaction (clicking the malicious link) but does not require authentication, and it can impact confidentiality and integrity by stealing session tokens or manipulating displayed content. The CVSS score is 6. 1 (medium severity), reflecting the moderate impact and ease of exploitation. No known exploits are currently in the wild, and no patches have been published yet. European healthcare organizations using MedDream PACS Premium are at risk, especially in countries with significant adoption of this medical imaging software.
AI-Powered Analysis
Technical Analysis
CVE-2025-54495 is a reflected cross-site scripting vulnerability categorized under CWE-79, affecting MedDream PACS Premium version 7.3.6.870. The vulnerability resides in the emailfailedjob functionality, where user-supplied input is improperly neutralized during web page generation. This improper sanitization allows an attacker to craft a malicious URL that, when accessed by a user, causes arbitrary JavaScript code execution in the victim’s browser. This can lead to session hijacking, credential theft, or manipulation of the web interface, compromising confidentiality and integrity of the affected system. The vulnerability is exploitable remotely over the network without authentication but requires user interaction to click the malicious link. The CVSS v3.1 base score of 6.1 reflects a medium severity, with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), scope changed (S:C), and low impact on confidentiality and integrity (C:L, I:L) with no impact on availability (A:N). No patches or known exploits are currently available, indicating the need for proactive mitigation. The vulnerability affects a critical healthcare product used for medical image management, making it a significant concern for healthcare providers relying on MedDream PACS Premium for diagnostic workflows.
Potential Impact
For European organizations, particularly healthcare providers using MedDream PACS Premium, this vulnerability poses a risk to patient data confidentiality and system integrity. Successful exploitation could allow attackers to steal session cookies or credentials, enabling unauthorized access to sensitive medical images and patient information. This could lead to privacy violations, regulatory non-compliance (e.g., GDPR), and potential disruption of clinical workflows. Although availability is not directly impacted, the loss of trust and potential data breaches could have severe reputational and financial consequences. The requirement for user interaction means phishing or social engineering campaigns could be used to exploit this vulnerability, increasing the risk in environments with less security awareness. Given the critical nature of healthcare data and the increasing targeting of healthcare infrastructure by cybercriminals, this vulnerability represents a moderate but tangible threat to European healthcare entities.
Mitigation Recommendations
Organizations should immediately implement strict input validation and output encoding on all user-supplied data, especially within the emailfailedjob functionality, to prevent injection of malicious scripts. Until an official patch is released, administrators should restrict access to the vulnerable functionality where possible, such as limiting exposure to trusted networks or using web application firewalls (WAFs) to detect and block suspicious requests containing malicious payloads. Security teams should conduct user awareness training to educate staff about the risks of clicking unknown or suspicious URLs, emphasizing phishing prevention. Monitoring web server logs for unusual URL patterns targeting the emailfailedjob endpoint can help detect attempted exploitation. Additionally, organizations should prepare for rapid patch deployment once MedDream releases an update addressing this vulnerability. Regular security assessments and penetration testing focusing on web application vulnerabilities are recommended to identify and remediate similar issues proactively.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- talos
- Date Reserved
- 2025-08-22T15:57:09.865Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 696f99d64623b1157c3aa45e
Added to database: 1/20/2026, 3:05:58 PM
Last enriched: 1/27/2026, 8:12:55 PM
Last updated: 2/5/2026, 5:28:18 PM
Views: 11
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0715: CWE-522: Insufficiently Protected Credentials in Moxa UC-1200A Series
HighCVE-2026-0714: CWE-319: Cleartext Transmission of Sensitive Information in Moxa UC-1200A Series
HighCVE-2025-70792: n/a
UnknownCVE-2025-70791: n/a
UnknownCVE-2025-69906: n/a
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.