CVE-2018-25142
Unknown Unknown - Not Provided
XXE Injection in NovaRad NovaPACS Viewer Allows File Disclosure

Publication date: 2025-12-24

Last updated on: 2025-12-24

Assigner: VulnCheck

Description
NovaRad NovaPACS Diagnostics Viewer 8.5.19.75 contains an unauthenticated XML External Entity (XXE) injection vulnerability in XML preference import settings. Attackers can craft malicious XML files with DTD parameter entities to retrieve arbitrary system files through an out-of-band channel attack.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-24
Last Modified
2025-12-24
Generated
2026-05-07
AI Q&A
2025-12-24
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
novarad novapacs_diagnostics_viewer 8.5.19.75
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-611 The product processes an XML document that can contain XML entities with URIs that resolve to documents outside of the intended sphere of control, causing the product to embed incorrect documents into its output.
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability allows unauthenticated attackers to retrieve arbitrary system files and potentially sensitive information from the affected system. This exposure of sensitive data could lead to non-compliance with data protection regulations such as GDPR and HIPAA, which require safeguarding personal and health information against unauthorized access and disclosure. [2, 3]


Can you explain this vulnerability to me?

CVE-2018-25142 is an unauthenticated XML External Entity (XXE) injection vulnerability in NovaRad NovaPACS Diagnostics Viewer version 8.5.19.75. It occurs during the import of XML preference settings, where attackers can craft malicious XML files using DTD parameter entities to exploit the system. This allows attackers to retrieve arbitrary system files through an out-of-band (OOB) channel by making the application process external XML entities, leading to unauthorized data disclosure. [2, 3]


How can this vulnerability impact me? :

This vulnerability can lead to the exposure and retrieval of arbitrary files from the affected system, including sensitive system and user data. Attackers can exploit it without authentication, potentially causing significant data disclosure. Additionally, it may lead to denial of service (DoS) conditions. The ability to access sensitive files poses a serious security risk to the confidentiality and integrity of the system running NovaPACS Diagnostics Viewer. [2, 3]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by attempting to import specially crafted malicious XML files that exploit the XML External Entity (XXE) injection in the NovaRad NovaPACS Diagnostics Viewer 8.5.19.75. A proof-of-concept involves crafting an XML file with external DTD parameter entities that trigger out-of-band HTTP requests to an attacker-controlled server. Monitoring network traffic for unusual HTTP GET requests to unknown external servers during XML import operations can help detect exploitation attempts. For detection, you can use network monitoring tools like Wireshark or tcpdump to capture outbound HTTP requests when importing XML preferences. Additionally, testing with crafted XML files similar to the PoC can confirm vulnerability presence. Example commands include: 1) Using tcpdump to monitor HTTP traffic on port 80 or 8080: `tcpdump -i <interface> tcp port 80 or tcp port 8080 -w capture.pcap` 2) Using curl or similar tools to test XML import with crafted payloads (requires application-specific import commands). [3]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include: 1) Disabling or restricting the XML preference import functionality in NovaRad NovaPACS Diagnostics Viewer until a patch or update is available. 2) Implementing network-level controls to block outbound HTTP requests from the affected system to untrusted external servers, preventing out-of-band data exfiltration. 3) Monitoring and alerting on unusual outbound network traffic patterns during XML import operations. 4) Applying any available vendor patches or updates once released. Since the vulnerability allows unauthenticated attackers to retrieve arbitrary files, limiting the application's network access and usage of XML imports is critical. [2, 3]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart