CVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
Sante PACS Server is vulnerable to stored cross-site scripting. An attacker could inject malicious HTML codes redirecting a user to a malicious webpage and stealing the user's cookie.
AI Analysis
Technical Summary
CVE-2025-54759 is a stored cross-site scripting (XSS) vulnerability identified in the Santesoft Sante PACS Server, a medical imaging and archiving system widely used in healthcare environments. The vulnerability arises from improper neutralization of input during web page generation (CWE-79), allowing an attacker to inject malicious HTML or JavaScript code into the application. When a legitimate user accesses the compromised content, the injected code executes within their browser context. This can lead to redirection to malicious websites and theft of session cookies, potentially enabling session hijacking or unauthorized access to sensitive patient data. The vulnerability does not require authentication (PR:N) but does require user interaction (UI:A), such as clicking a crafted link or viewing a malicious page. The attack vector is network-based (AV:N) with low attack complexity (AC:L), and the vulnerability impacts confidentiality and integrity to a limited extent (VC:L, VI:L). The CVSS 4.0 base score is 5.1, categorizing it as medium severity. No known exploits are currently reported in the wild, and no patches have been published yet. Given the critical nature of healthcare data and the role of PACS servers in clinical workflows, exploitation could disrupt operations and compromise patient privacy.
Potential Impact
For European organizations, particularly healthcare providers and hospitals using Sante PACS Server, this vulnerability poses a significant risk to patient data confidentiality and system integrity. Successful exploitation could lead to unauthorized access to patient imaging data, session hijacking of medical staff accounts, and potential redirection to phishing or malware sites. This undermines trust in healthcare IT systems and may violate GDPR requirements for protecting personal health information. Additionally, disruption of PACS services could delay diagnosis and treatment, impacting patient care quality. The medium severity rating suggests moderate risk, but the sensitive nature of healthcare environments amplifies the potential consequences. Organizations may also face reputational damage and regulatory penalties if breaches occur due to this vulnerability.
Mitigation Recommendations
To mitigate this vulnerability, European healthcare organizations should implement the following specific measures: 1) Immediately apply any available vendor patches or updates once released by Santesoft. 2) Employ web application firewalls (WAFs) with custom rules to detect and block malicious input patterns targeting the PACS Server interfaces. 3) Conduct thorough input validation and output encoding on all user-supplied data within the PACS Server environment, especially in web page generation components. 4) Restrict access to the PACS Server management interfaces to trusted internal networks and enforce strong authentication and session management controls. 5) Educate medical staff on the risks of clicking unknown links or opening suspicious content related to PACS systems. 6) Monitor logs for unusual activity indicative of XSS exploitation attempts, such as unexpected redirects or anomalous cookie usage. 7) Consider network segmentation to isolate PACS infrastructure from general user networks to limit attack surface. These targeted actions go beyond generic advice and address the specific threat vectors and operational context of the Sante PACS Server.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Switzerland, Austria
CVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
Description
Sante PACS Server is vulnerable to stored cross-site scripting. An attacker could inject malicious HTML codes redirecting a user to a malicious webpage and stealing the user's cookie.
AI-Powered Analysis
Technical Analysis
CVE-2025-54759 is a stored cross-site scripting (XSS) vulnerability identified in the Santesoft Sante PACS Server, a medical imaging and archiving system widely used in healthcare environments. The vulnerability arises from improper neutralization of input during web page generation (CWE-79), allowing an attacker to inject malicious HTML or JavaScript code into the application. When a legitimate user accesses the compromised content, the injected code executes within their browser context. This can lead to redirection to malicious websites and theft of session cookies, potentially enabling session hijacking or unauthorized access to sensitive patient data. The vulnerability does not require authentication (PR:N) but does require user interaction (UI:A), such as clicking a crafted link or viewing a malicious page. The attack vector is network-based (AV:N) with low attack complexity (AC:L), and the vulnerability impacts confidentiality and integrity to a limited extent (VC:L, VI:L). The CVSS 4.0 base score is 5.1, categorizing it as medium severity. No known exploits are currently reported in the wild, and no patches have been published yet. Given the critical nature of healthcare data and the role of PACS servers in clinical workflows, exploitation could disrupt operations and compromise patient privacy.
Potential Impact
For European organizations, particularly healthcare providers and hospitals using Sante PACS Server, this vulnerability poses a significant risk to patient data confidentiality and system integrity. Successful exploitation could lead to unauthorized access to patient imaging data, session hijacking of medical staff accounts, and potential redirection to phishing or malware sites. This undermines trust in healthcare IT systems and may violate GDPR requirements for protecting personal health information. Additionally, disruption of PACS services could delay diagnosis and treatment, impacting patient care quality. The medium severity rating suggests moderate risk, but the sensitive nature of healthcare environments amplifies the potential consequences. Organizations may also face reputational damage and regulatory penalties if breaches occur due to this vulnerability.
Mitigation Recommendations
To mitigate this vulnerability, European healthcare organizations should implement the following specific measures: 1) Immediately apply any available vendor patches or updates once released by Santesoft. 2) Employ web application firewalls (WAFs) with custom rules to detect and block malicious input patterns targeting the PACS Server interfaces. 3) Conduct thorough input validation and output encoding on all user-supplied data within the PACS Server environment, especially in web page generation components. 4) Restrict access to the PACS Server management interfaces to trusted internal networks and enforce strong authentication and session management controls. 5) Educate medical staff on the risks of clicking unknown links or opening suspicious content related to PACS systems. 6) Monitor logs for unusual activity indicative of XSS exploitation attempts, such as unexpected redirects or anomalous cookie usage. 7) Consider network segmentation to isolate PACS infrastructure from general user networks to limit attack surface. These targeted actions go beyond generic advice and address the specific threat vectors and operational context of the Sante PACS Server.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- icscert
- Date Reserved
- 2025-08-05T22:22:55.593Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68a39bfcad5a09ad00df5d7b
Added to database: 8/18/2025, 9:32:44 PM
Last enriched: 8/26/2025, 1:31:49 AM
Last updated: 9/30/2025, 2:50:06 AM
Views: 51
Related Threats
CVE-2025-41098: CWE-639 Authorization Bypass Through User-Controlled Key in GLOBAL PLANNING SOLUTIONS S.L (GPS) BOLD Workplanner
HighCVE-2025-11149: Denial of Service (DoS) in node-static
HighCVE-2025-11148: Command Injection in check-branches
CriticalCVE-2025-43827: CWE-639 Authorization Bypass Through User-Controlled Key in Liferay Portal
MediumCVE-2025-56132: n/a
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.