CVE-2025-53912

An arbitrary file read vulnerability exists in the encapsulatedDoc functionality of MedDream PACS Premium 7.3.6.870. A specially crafted HTTP request can lead to an arbitrary file read. An attacker can send http request to trigger this vulnerability.
Configurations

Configuration 1 (hide)

cpe:2.3:a:meddream:pacs_server:7.3.6.870:*:*:*:premium:*:*:*

History

29 Jan 2026, 15:26

Type Values Removed Values Added
References () https://talosintelligence.com/vulnerability_reports/TALOS-2025-2273 - () https://talosintelligence.com/vulnerability_reports/TALOS-2025-2273 - Exploit, Third Party Advisory
References () https://www.talosintelligence.com/vulnerability_reports/TALOS-2025-2273 - () https://www.talosintelligence.com/vulnerability_reports/TALOS-2025-2273 - Exploit, Third Party Advisory
CPE cpe:2.3:a:meddream:pacs_server:7.3.6.870:*:*:*:premium:*:*:*
First Time Meddream pacs Server
Meddream

20 Jan 2026, 18:16

Type Values Removed Values Added
References
  • () https://www.talosintelligence.com/vulnerability_reports/TALOS-2025-2273 -

20 Jan 2026, 15:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-01-20 15:16

Updated : 2026-01-29 15:26


NVD link : CVE-2025-53912

Mitre link : CVE-2025-53912

CVE.ORG link : CVE-2025-53912


JSON object : View

Products Affected

meddream

  • pacs_server
CWE
CWE-73

External Control of File Name or Path