Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-54852: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in MedDream MedDream PACS Premium

0
Medium
VulnerabilityCVE-2025-54852cvecve-2025-54852cwe-79
Published: Tue Jan 20 2026 (01/20/2026, 14:49:58 UTC)
Source: CVE Database V5
Vendor/Project: MedDream
Product: MedDream PACS Premium

Description

CVE-2025-54852 is a reflected cross-site scripting (XSS) vulnerability in MedDream PACS Premium version 7. 3. 6. 870, specifically in the modifyAeTitle functionality. An attacker can craft a malicious URL that, when visited by a user, executes arbitrary JavaScript code in the context of the victim's browser. This vulnerability requires user interaction (clicking the malicious link) but does not require authentication. The CVSS score is 6. 1 (medium severity), reflecting limited confidentiality and integrity impact but no availability impact. There are no known exploits in the wild currently, and no patches have been linked yet. European healthcare organizations using this PACS software could be targeted, potentially risking patient data confidentiality and session integrity.

AI-Powered Analysis

AILast updated: 01/27/2026, 20:09:57 UTC

Technical Analysis

CVE-2025-54852 is a reflected cross-site scripting (XSS) vulnerability identified in MedDream PACS Premium version 7.3.6.870, a medical imaging software widely used for managing and viewing medical images. The vulnerability resides in the modifyAeTitle functionality, where user input is improperly neutralized during web page generation, allowing malicious input to be reflected back unsanitized. An attacker can exploit this by crafting a malicious URL containing JavaScript payloads that execute in the victim's browser when the URL is accessed. This can lead to theft of session cookies, user impersonation, or manipulation of the web interface, compromising confidentiality and integrity of sensitive medical data. The vulnerability requires no authentication but does require user interaction, such as clicking a malicious link. The CVSS 3.1 score of 6.1 indicates medium severity, with network attack vector, low attack complexity, no privileges required, user interaction required, and scope changed due to potential impact beyond the vulnerable component. No known exploits in the wild have been reported, and no official patches have been linked yet, indicating the need for proactive mitigation. Given the critical nature of PACS systems in healthcare, exploitation could disrupt clinical workflows and expose protected health information (PHI).

Potential Impact

For European organizations, particularly healthcare providers using MedDream PACS Premium, this vulnerability poses a risk to patient data confidentiality and the integrity of medical imaging workflows. Successful exploitation could allow attackers to hijack user sessions, steal credentials, or inject malicious scripts that alter displayed information, potentially leading to misdiagnosis or data leakage. Although availability is not directly impacted, the trustworthiness of the PACS system could be undermined, affecting clinical decision-making. Given the strict regulatory environment in Europe (e.g., GDPR), any data breach resulting from this vulnerability could lead to significant legal and financial repercussions. The medium severity rating reflects the need for timely remediation to prevent targeted phishing or social engineering attacks leveraging this vulnerability.

Mitigation Recommendations

1. Implement strict input validation and output encoding on the modifyAeTitle functionality to neutralize malicious scripts. 2. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in the PACS web interface. 3. Educate users, especially healthcare staff, to be cautious about clicking on unsolicited or suspicious URLs related to PACS systems. 4. Monitor web server logs for unusual URL access patterns that may indicate exploitation attempts. 5. Segregate PACS systems within secure network zones with limited internet exposure to reduce attack surface. 6. Apply vendor patches promptly once released; in the meantime, consider temporary workarounds such as disabling vulnerable features if feasible. 7. Conduct regular security assessments and penetration testing focusing on web application vulnerabilities in healthcare software. 8. Utilize web application firewalls (WAF) with rules to detect and block reflected XSS payloads targeting the PACS application.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
talos
Date Reserved
2025-08-22T16:09:33.151Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 696f99d74623b1157c3aa492

Added to database: 1/20/2026, 3:05:59 PM

Last enriched: 1/27/2026, 8:09:57 PM

Last updated: 2/5/2026, 10:49:34 PM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats