Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-57787: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in MedDream MedDream PACS Premium

0
Medium
VulnerabilityCVE-2025-57787cvecve-2025-57787cwe-79
Published: Tue Jan 20 2026 (01/20/2026, 14:49:46 UTC)
Source: CVE Database V5
Vendor/Project: MedDream
Product: MedDream PACS Premium

Description

CVE-2025-57787 is a reflected cross-site scripting (XSS) vulnerability in MedDream PACS Premium version 7. 3. 6. 870, specifically in the modifyRoute functionality. An attacker can craft a malicious URL that, when visited by a user, executes arbitrary JavaScript code in the context of the victim's browser. This vulnerability requires user interaction (clicking the malicious link) but does not require authentication. The CVSS score is 6. 1 (medium severity), reflecting limited confidentiality and integrity impact but no availability impact. No known exploits are currently reported in the wild. European healthcare organizations using this PACS software are at risk of targeted phishing or social engineering attacks leveraging this vulnerability.

AI-Powered Analysis

AILast updated: 01/27/2026, 20:11:12 UTC

Technical Analysis

CVE-2025-57787 identifies a reflected cross-site scripting (XSS) vulnerability in MedDream PACS Premium version 7.3.6.870, a medical imaging software widely used for managing and viewing medical images. The vulnerability resides in the modifyRoute functionality, where user-supplied input is improperly neutralized during web page generation, allowing injection of malicious JavaScript code. When a victim clicks on a specially crafted URL containing the malicious payload, the script executes in their browser context, potentially stealing session cookies, performing actions on behalf of the user, or redirecting to malicious sites. This is a reflected XSS, meaning the payload is part of the URL and not stored on the server, requiring user interaction to trigger. The vulnerability does not require authentication, increasing its risk profile. The CVSS 3.1 score of 6.1 reflects the attack vector as network-based with low attack complexity, no privileges required, but requiring user interaction. The impact affects confidentiality and integrity but not availability. No patches or known exploits are currently reported, but the vulnerability is publicly disclosed and could be weaponized. Given the critical nature of PACS systems in healthcare workflows, exploitation could lead to unauthorized data exposure or manipulation of user sessions. The CWE-79 classification confirms this is an input validation flaw leading to XSS. Organizations using this version of MedDream PACS should prioritize remediation and user awareness to prevent exploitation.

Potential Impact

For European organizations, particularly healthcare providers using MedDream PACS Premium 7.3.6.870, this vulnerability poses a risk of client-side attacks that can compromise patient data confidentiality and user session integrity. Exploitation could enable attackers to hijack user sessions, steal sensitive medical information, or perform unauthorized actions within the PACS web interface. Although the vulnerability does not directly impact system availability, the resulting data breaches or unauthorized access could lead to regulatory penalties under GDPR, reputational damage, and disruption of clinical workflows. The requirement for user interaction means phishing or social engineering campaigns could be used to exploit this vulnerability. Given the critical role of PACS in diagnostic imaging and patient care, even medium-severity vulnerabilities warrant prompt attention to avoid cascading impacts on healthcare delivery and patient safety.

Mitigation Recommendations

1. Monitor MedDream vendor communications for official patches addressing CVE-2025-57787 and apply them immediately upon release. 2. Implement web application firewall (WAF) rules to detect and block malicious payloads targeting the modifyRoute parameter. 3. Conduct input validation and output encoding on all user-supplied data in the web application to neutralize potentially malicious scripts. 4. Educate healthcare staff about phishing risks and the dangers of clicking on unsolicited or suspicious URLs, especially those related to PACS systems. 5. Employ browser security features such as Content Security Policy (CSP) to restrict execution of unauthorized scripts. 6. Regularly audit and monitor web server logs for unusual URL patterns indicative of attempted exploitation. 7. Consider network segmentation to limit access to PACS web interfaces only to trusted internal users and devices. 8. Use multi-factor authentication (MFA) where possible to reduce risk from session hijacking.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
talos
Date Reserved
2025-08-22T16:16:44.793Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 696f99d74623b1157c3aa4a1

Added to database: 1/20/2026, 3:05:59 PM

Last enriched: 1/27/2026, 8:11:12 PM

Last updated: 2/8/2026, 4:40:00 AM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats