A server-side request forgery vulnerability exists in the cecho.php functionality of MedDream PACS Premium 7.3.5.860. A specially crafted HTTP request can lead to SSRF. An attacker can make an unauthenticated HTTP request to trigger this vulnerability.
References
| Link | Resource |
|---|---|
| https://talosintelligence.com/vulnerability_reports/TALOS-2025-2177 | Exploit Third Party Advisory |
| https://www.talosintelligence.com/vulnerability_reports/TALOS-2025-2177 |
Configurations
History
03 Nov 2025, 20:17
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
|
| References | () https://talosintelligence.com/vulnerability_reports/TALOS-2025-2177 - Exploit, Third Party Advisory | |
| First Time |
Meddream pacs Server
Meddream |
|
| CPE | cpe:2.3:a:meddream:pacs_server:7.3.5.860:*:*:*:premium:*:*:* |
29 Jul 2025, 14:14
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
28 Jul 2025, 14:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-07-28 14:15
Updated : 2025-11-03 20:17
NVD link : CVE-2025-24485
Mitre link : CVE-2025-24485
CVE.ORG link : CVE-2025-24485
JSON object : View
Products Affected
meddream
- pacs_server
CWE
CWE-918
Server-Side Request Forgery (SSRF)
