CVE-2025-53516
BaseFortify
Publication date: 2026-01-20
Last updated on: 2026-01-29
Assigner: Talos
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| meddream | pacs_server | 7.3.6.870 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a reflected cross-site scripting (XSS) issue in the downloadZip functionality of MedDream PACS Premium version 7.3.6.870. It occurs because the 'seq' parameter in the downloadZip.php script is not properly sanitized before being included in the HTML output. An attacker can craft a malicious URL containing JavaScript code in the 'seq' parameter, which will then be executed in the victim's browser when they access the URL. This can happen without any user authentication. [1]
How can this vulnerability impact me? :
This vulnerability can allow an attacker to execute arbitrary JavaScript code in the context of the victim's browser. This can lead to theft of sensitive information, session hijacking, or performing actions on behalf of the user. Since the vulnerability is pre-authentication and exploitable via a crafted URL, it can be used to target users of the MedDream PACS Premium system, potentially compromising confidentiality and integrity of data accessible through the application. [1]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by testing the downloadZip functionality of MedDream PACS Premium 7.3.6.870 for reflected XSS in the `seq` parameter. You can try accessing a URL similar to `/Pacs/downloadZip.php?seq=<script>alert(1)</script>` and observe if the script executes in the browser. For network detection, monitoring HTTP requests to the `downloadZip.php` endpoint with suspicious `seq` parameter values containing script tags or other JavaScript code can help identify exploitation attempts. There are no specific commands provided, but using tools like curl or a browser to send crafted requests to the vulnerable URL and checking for reflected script execution is recommended. [1]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include applying the vendor's patch released on December 5, 2025, which addresses the improper sanitization of the `seq` parameter. Until the patch is applied, you can implement input validation or filtering on the `seq` parameter to block or sanitize script tags and other malicious input. Additionally, restricting access to the `downloadZip.php` endpoint or monitoring and blocking suspicious requests can reduce exploitation risk. [1]
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The provided resources do not specify how this reflected XSS vulnerability in MedDream PACS Premium affects compliance with standards such as GDPR or HIPAA.