CVE-2025-54853
BaseFortify
Publication date: 2026-01-20
Last updated on: 2026-01-29
Assigner: Talos
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| meddream | pacs_server | 7.3.6.870 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2025-54853 is a reflected cross-site scripting (XSS) vulnerability in the modifyUser functionality of MedDream PACS Premium 7.3.6.870. It occurs because the 'user' parameter in the modifyUser.php script is directly embedded into the HTML output without proper sanitization or encoding. An attacker can craft a malicious URL containing JavaScript code in the 'user' parameter, which is then executed in the victim's browser when the page loads. This requires the attacker to have an authenticated session but no special privileges. [1]
How can this vulnerability impact me? :
This vulnerability can allow an attacker to execute arbitrary JavaScript code in the context of the victim's browser session. This can lead to theft of sensitive information, session hijacking, or performing actions on behalf of the user. Since it requires user interaction and an authenticated session, the attacker can exploit it to compromise confidentiality and integrity of user data within the application. [1]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by checking for reflected XSS attempts in the modifyUser functionality by sending crafted HTTP GET requests to the /Pacs/modifyUser.php endpoint with a malicious 'user' parameter. For example, you can use curl to test if the server reflects the input unsanitized: curl -i "http://<target>/Pacs/modifyUser.php?user=<script>alert(1)</script>" and observe if the response contains the injected script in the HTML output. Monitoring web server logs for suspicious requests containing script tags in the 'user' parameter can also help detect exploitation attempts. [1]
What immediate steps should I take to mitigate this vulnerability?
The immediate mitigation step is to apply the vendor's patch released on 2025-12-05 for MedDream PACS Premium version 7.3.6.870. Until the patch is applied, restrict access to the modifyUser functionality to trusted users only, and consider implementing web application firewall (WAF) rules to block requests containing suspicious script tags in the 'user' parameter. Additionally, educate users to avoid clicking on untrusted links that may exploit this reflected XSS vulnerability. [1]
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The provided resources do not specify how this reflected XSS vulnerability in MedDream PACS Premium affects compliance with common standards and regulations such as GDPR or HIPAA.