CVE-2025-58087: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in MedDream MedDream PACS Premium
Multiple reflected cross-site scripting (xss) vulnerabilities exist in the config.php functionality of MedDream PACS Premium 7.3.6.870. Specially crafted malicious URLs can lead to arbitrary javascript code execution. An attacker can provide a crafted URL to trigger these vulnerabilities.This vulnerability affects the status parameter.
AI Analysis
Technical Summary
CVE-2025-58087 is a reflected cross-site scripting (XSS) vulnerability identified in MedDream PACS Premium version 7.3.6.870, a medical imaging software widely used for managing and viewing DICOM images. The vulnerability resides in the config.php component, specifically in the handling of the 'status' parameter. Improper input sanitization allows attackers to inject malicious JavaScript code via specially crafted URLs. When a user clicks such a URL, the injected script executes in the context of the victim's browser session, potentially leading to session hijacking, credential theft, or unauthorized actions performed on behalf of the user. The CVSS 3.1 base score is 6.1, indicating a medium severity level, with an attack vector of network (no physical access needed), low attack complexity, no privileges required, but requiring user interaction. The scope is changed (S:C), meaning the vulnerability can affect resources beyond the vulnerable component. Confidentiality and integrity impacts are low, while availability is unaffected. No patches or known exploits are currently available, but the vulnerability's presence in a critical healthcare application increases its risk profile. The vulnerability is categorized under CWE-79, which covers improper neutralization of input during web page generation, a common vector for XSS attacks.
Potential Impact
For European organizations, particularly healthcare providers using MedDream PACS Premium, this vulnerability poses a significant risk to patient data confidentiality and system integrity. Exploitation could allow attackers to steal session cookies or credentials, leading to unauthorized access to sensitive medical images and patient information. This could result in violations of GDPR and other data protection regulations, potentially incurring heavy fines and reputational damage. Additionally, attackers might manipulate displayed data, causing misdiagnosis or treatment errors. The requirement for user interaction limits mass exploitation but targeted phishing campaigns could be effective. The vulnerability does not affect system availability directly but undermines trust in healthcare IT systems. Given the critical nature of healthcare services, even medium-severity vulnerabilities warrant prompt attention.
Mitigation Recommendations
Since no official patches are currently available, European organizations should implement immediate mitigations to reduce risk. These include: 1) Employing web application firewalls (WAFs) with rules to detect and block malicious payloads targeting the 'status' parameter in config.php requests. 2) Educating users, especially healthcare staff, to recognize and avoid suspicious links, reducing the likelihood of successful phishing attacks. 3) Implementing Content Security Policy (CSP) headers to restrict execution of unauthorized scripts in browsers. 4) Conducting regular security assessments and penetration testing focused on web application input validation. 5) Monitoring web server logs for unusual request patterns targeting the vulnerable parameter. 6) Planning for an urgent upgrade or patch deployment once the vendor releases a fix. 7) Isolating PACS systems within secure network segments to limit exposure. These targeted actions go beyond generic advice and address the specific attack vector and environment.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Belgium, Poland, Switzerland
CVE-2025-58087: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in MedDream MedDream PACS Premium
Description
Multiple reflected cross-site scripting (xss) vulnerabilities exist in the config.php functionality of MedDream PACS Premium 7.3.6.870. Specially crafted malicious URLs can lead to arbitrary javascript code execution. An attacker can provide a crafted URL to trigger these vulnerabilities.This vulnerability affects the status parameter.
AI-Powered Analysis
Technical Analysis
CVE-2025-58087 is a reflected cross-site scripting (XSS) vulnerability identified in MedDream PACS Premium version 7.3.6.870, a medical imaging software widely used for managing and viewing DICOM images. The vulnerability resides in the config.php component, specifically in the handling of the 'status' parameter. Improper input sanitization allows attackers to inject malicious JavaScript code via specially crafted URLs. When a user clicks such a URL, the injected script executes in the context of the victim's browser session, potentially leading to session hijacking, credential theft, or unauthorized actions performed on behalf of the user. The CVSS 3.1 base score is 6.1, indicating a medium severity level, with an attack vector of network (no physical access needed), low attack complexity, no privileges required, but requiring user interaction. The scope is changed (S:C), meaning the vulnerability can affect resources beyond the vulnerable component. Confidentiality and integrity impacts are low, while availability is unaffected. No patches or known exploits are currently available, but the vulnerability's presence in a critical healthcare application increases its risk profile. The vulnerability is categorized under CWE-79, which covers improper neutralization of input during web page generation, a common vector for XSS attacks.
Potential Impact
For European organizations, particularly healthcare providers using MedDream PACS Premium, this vulnerability poses a significant risk to patient data confidentiality and system integrity. Exploitation could allow attackers to steal session cookies or credentials, leading to unauthorized access to sensitive medical images and patient information. This could result in violations of GDPR and other data protection regulations, potentially incurring heavy fines and reputational damage. Additionally, attackers might manipulate displayed data, causing misdiagnosis or treatment errors. The requirement for user interaction limits mass exploitation but targeted phishing campaigns could be effective. The vulnerability does not affect system availability directly but undermines trust in healthcare IT systems. Given the critical nature of healthcare services, even medium-severity vulnerabilities warrant prompt attention.
Mitigation Recommendations
Since no official patches are currently available, European organizations should implement immediate mitigations to reduce risk. These include: 1) Employing web application firewalls (WAFs) with rules to detect and block malicious payloads targeting the 'status' parameter in config.php requests. 2) Educating users, especially healthcare staff, to recognize and avoid suspicious links, reducing the likelihood of successful phishing attacks. 3) Implementing Content Security Policy (CSP) headers to restrict execution of unauthorized scripts in browsers. 4) Conducting regular security assessments and penetration testing focused on web application input validation. 5) Monitoring web server logs for unusual request patterns targeting the vulnerable parameter. 6) Planning for an urgent upgrade or patch deployment once the vendor releases a fix. 7) Isolating PACS systems within secure network segments to limit exposure. These targeted actions go beyond generic advice and address the specific attack vector and environment.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- talos
- Date Reserved
- 2025-08-22T16:31:20.727Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 696f99d94623b1157c3aa4b4
Added to database: 1/20/2026, 3:06:01 PM
Last enriched: 1/27/2026, 7:45:42 PM
Last updated: 2/5/2026, 5:38:22 PM
Views: 14
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0715: CWE-522: Insufficiently Protected Credentials in Moxa UC-1200A Series
HighCVE-2026-0714: CWE-319: Cleartext Transmission of Sensitive Information in Moxa UC-1200A Series
HighCVE-2025-70792: n/a
HighCVE-2025-70791: n/a
HighCVE-2025-69906: n/a
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.