Skip to main content

CVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server

Medium
VulnerabilityCVE-2025-54862cvecve-2025-54862cwe-79
Published: Mon Aug 18 2025 (08/18/2025, 21:23:42 UTC)
Source: CVE Database V5
Vendor/Project: Santesoft
Product: Sante PACS Server

Description

Sante PACS Server web portal is vulnerable to stored cross-site scripting. An attacker could inject malicious HTML codes redirecting a user to a malicious webpage and stealing the user's cookie.

AI-Powered Analysis

AILast updated: 08/26/2025, 01:32:05 UTC

Technical Analysis

CVE-2025-54862 is a stored cross-site scripting (XSS) vulnerability identified in the Santesoft Sante PACS Server web portal. This vulnerability arises due to improper neutralization of input during web page generation, classified under CWE-79. Specifically, the web portal fails to adequately sanitize user-supplied input before embedding it into web pages, allowing an attacker to inject malicious HTML or JavaScript code. When a legitimate user accesses the affected page, the malicious script executes in their browser context. This can lead to unauthorized actions such as redirecting users to malicious websites and stealing session cookies, which could facilitate session hijacking or unauthorized access to the PACS system. The vulnerability affects version 0 of the product, with no patches currently available. The CVSS v4.0 base score is 4.8, indicating a medium severity level. The attack vector is network-based with low attack complexity, requiring low privileges and user interaction. The impact on confidentiality and integrity is low to limited, with no direct availability impact. No known exploits are reported in the wild as of the publication date (August 18, 2025). Stored XSS in a healthcare PACS (Picture Archiving and Communication System) server is particularly concerning because it can compromise sensitive medical imaging data and patient information, potentially violating privacy regulations and undermining trust in healthcare IT systems.

Potential Impact

For European organizations, especially healthcare providers using the Sante PACS Server, this vulnerability poses a risk to patient data confidentiality and system integrity. Successful exploitation could allow attackers to hijack user sessions, leading to unauthorized access to sensitive medical images and patient records. This could result in data breaches, non-compliance with GDPR and other healthcare data protection regulations, and reputational damage. Additionally, redirected users might be exposed to further phishing or malware attacks. The impact is heightened in healthcare environments where availability and integrity of imaging data are critical for patient care. Although the CVSS score suggests medium severity, the sensitive nature of healthcare data and regulatory environment in Europe amplify the consequences of exploitation. The lack of patches means organizations must rely on compensating controls until a fix is available.

Mitigation Recommendations

European healthcare organizations using Sante PACS Server should implement the following specific mitigations: 1) Employ web application firewalls (WAFs) with custom rules to detect and block malicious input patterns targeting the vulnerable endpoints. 2) Conduct input validation and output encoding at the application layer where possible, even if the vendor patch is unavailable, by applying reverse proxies or middleware that sanitize inputs and outputs. 3) Enforce strict Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers accessing the PACS portal. 4) Educate users to recognize suspicious redirects and avoid clicking on unexpected links within the portal. 5) Monitor web server and application logs for unusual activity indicative of attempted XSS exploitation. 6) Segregate the PACS server network segment and restrict access to authorized personnel only, minimizing exposure. 7) Engage with the vendor for timely patch releases and apply updates promptly once available. 8) Regularly audit and review user privileges to limit the potential impact of compromised accounts. These measures go beyond generic advice by focusing on layered defenses tailored to the healthcare PACS environment and the specific nature of stored XSS.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
icscert
Date Reserved
2025-08-05T22:22:55.583Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68a39bfcad5a09ad00df5d7e

Added to database: 8/18/2025, 9:32:44 PM

Last enriched: 8/26/2025, 1:32:05 AM

Last updated: 9/30/2025, 5:42:04 AM

Views: 42

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats