CVE-2025-54852: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in MedDream MedDream PACS Premium
CVE-2025-54852 is a reflected cross-site scripting (XSS) vulnerability in MedDream PACS Premium version 7. 3. 6. 870, specifically in the modifyAeTitle functionality. An attacker can craft a malicious URL that, when visited by a user, executes arbitrary JavaScript code in the context of the victim's browser. This vulnerability requires user interaction (clicking the malicious link) but does not require authentication. The CVSS score is 6. 1 (medium severity), reflecting limited confidentiality and integrity impact but no availability impact. There are no known exploits in the wild currently, and no patches have been linked yet. European healthcare organizations using this PACS software could be targeted, potentially risking patient data confidentiality and session integrity.
AI Analysis
Technical Summary
CVE-2025-54852 is a reflected cross-site scripting (XSS) vulnerability identified in MedDream PACS Premium version 7.3.6.870, a medical imaging software widely used for managing and viewing medical images. The vulnerability resides in the modifyAeTitle functionality, where user input is improperly neutralized during web page generation, allowing malicious input to be reflected back unsanitized. An attacker can exploit this by crafting a malicious URL containing JavaScript payloads that execute in the victim's browser when the URL is accessed. This can lead to theft of session cookies, user impersonation, or manipulation of the web interface, compromising confidentiality and integrity of sensitive medical data. The vulnerability requires no authentication but does require user interaction, such as clicking a malicious link. The CVSS 3.1 score of 6.1 indicates medium severity, with network attack vector, low attack complexity, no privileges required, user interaction required, and scope changed due to potential impact beyond the vulnerable component. No known exploits in the wild have been reported, and no official patches have been linked yet, indicating the need for proactive mitigation. Given the critical nature of PACS systems in healthcare, exploitation could disrupt clinical workflows and expose protected health information (PHI).
Potential Impact
For European organizations, particularly healthcare providers using MedDream PACS Premium, this vulnerability poses a risk to patient data confidentiality and the integrity of medical imaging workflows. Successful exploitation could allow attackers to hijack user sessions, steal credentials, or inject malicious scripts that alter displayed information, potentially leading to misdiagnosis or data leakage. Although availability is not directly impacted, the trustworthiness of the PACS system could be undermined, affecting clinical decision-making. Given the strict regulatory environment in Europe (e.g., GDPR), any data breach resulting from this vulnerability could lead to significant legal and financial repercussions. The medium severity rating reflects the need for timely remediation to prevent targeted phishing or social engineering attacks leveraging this vulnerability.
Mitigation Recommendations
1. Implement strict input validation and output encoding on the modifyAeTitle functionality to neutralize malicious scripts. 2. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in the PACS web interface. 3. Educate users, especially healthcare staff, to be cautious about clicking on unsolicited or suspicious URLs related to PACS systems. 4. Monitor web server logs for unusual URL access patterns that may indicate exploitation attempts. 5. Segregate PACS systems within secure network zones with limited internet exposure to reduce attack surface. 6. Apply vendor patches promptly once released; in the meantime, consider temporary workarounds such as disabling vulnerable features if feasible. 7. Conduct regular security assessments and penetration testing focusing on web application vulnerabilities in healthcare software. 8. Utilize web application firewalls (WAF) with rules to detect and block reflected XSS payloads targeting the PACS application.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden
CVE-2025-54852: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in MedDream MedDream PACS Premium
Description
CVE-2025-54852 is a reflected cross-site scripting (XSS) vulnerability in MedDream PACS Premium version 7. 3. 6. 870, specifically in the modifyAeTitle functionality. An attacker can craft a malicious URL that, when visited by a user, executes arbitrary JavaScript code in the context of the victim's browser. This vulnerability requires user interaction (clicking the malicious link) but does not require authentication. The CVSS score is 6. 1 (medium severity), reflecting limited confidentiality and integrity impact but no availability impact. There are no known exploits in the wild currently, and no patches have been linked yet. European healthcare organizations using this PACS software could be targeted, potentially risking patient data confidentiality and session integrity.
AI-Powered Analysis
Technical Analysis
CVE-2025-54852 is a reflected cross-site scripting (XSS) vulnerability identified in MedDream PACS Premium version 7.3.6.870, a medical imaging software widely used for managing and viewing medical images. The vulnerability resides in the modifyAeTitle functionality, where user input is improperly neutralized during web page generation, allowing malicious input to be reflected back unsanitized. An attacker can exploit this by crafting a malicious URL containing JavaScript payloads that execute in the victim's browser when the URL is accessed. This can lead to theft of session cookies, user impersonation, or manipulation of the web interface, compromising confidentiality and integrity of sensitive medical data. The vulnerability requires no authentication but does require user interaction, such as clicking a malicious link. The CVSS 3.1 score of 6.1 indicates medium severity, with network attack vector, low attack complexity, no privileges required, user interaction required, and scope changed due to potential impact beyond the vulnerable component. No known exploits in the wild have been reported, and no official patches have been linked yet, indicating the need for proactive mitigation. Given the critical nature of PACS systems in healthcare, exploitation could disrupt clinical workflows and expose protected health information (PHI).
Potential Impact
For European organizations, particularly healthcare providers using MedDream PACS Premium, this vulnerability poses a risk to patient data confidentiality and the integrity of medical imaging workflows. Successful exploitation could allow attackers to hijack user sessions, steal credentials, or inject malicious scripts that alter displayed information, potentially leading to misdiagnosis or data leakage. Although availability is not directly impacted, the trustworthiness of the PACS system could be undermined, affecting clinical decision-making. Given the strict regulatory environment in Europe (e.g., GDPR), any data breach resulting from this vulnerability could lead to significant legal and financial repercussions. The medium severity rating reflects the need for timely remediation to prevent targeted phishing or social engineering attacks leveraging this vulnerability.
Mitigation Recommendations
1. Implement strict input validation and output encoding on the modifyAeTitle functionality to neutralize malicious scripts. 2. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in the PACS web interface. 3. Educate users, especially healthcare staff, to be cautious about clicking on unsolicited or suspicious URLs related to PACS systems. 4. Monitor web server logs for unusual URL access patterns that may indicate exploitation attempts. 5. Segregate PACS systems within secure network zones with limited internet exposure to reduce attack surface. 6. Apply vendor patches promptly once released; in the meantime, consider temporary workarounds such as disabling vulnerable features if feasible. 7. Conduct regular security assessments and penetration testing focusing on web application vulnerabilities in healthcare software. 8. Utilize web application firewalls (WAF) with rules to detect and block reflected XSS payloads targeting the PACS application.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- talos
- Date Reserved
- 2025-08-22T16:09:33.151Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 696f99d74623b1157c3aa492
Added to database: 1/20/2026, 3:05:59 PM
Last enriched: 1/27/2026, 8:09:57 PM
Last updated: 2/5/2026, 10:49:34 PM
Views: 12
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-24302: CWE-284: Improper Access Control in Microsoft Azure ARC
HighCVE-2026-24300: CWE-284: Improper Access Control in Microsoft Azure Front Door
CriticalCVE-2026-21532: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in Microsoft Azure Functions
HighCVE-2026-0391: CWE-451: User Interface (UI) Misrepresentation of Critical Information in Microsoft Microsoft Edge (Chromium-based)
MediumCVE-2026-1970: Open Redirect in Edimax BR-6258n
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.