A privilege escalation vulnerability exists in the login.php functionality of meddream MedDream PACS Premium 7.3.3.840. A specially crafted .php file can lead to elevated capabilities. An attacker can upload a malicious file to trigger this vulnerability.
References
| Link | Resource |
|---|---|
| https://talosintelligence.com/vulnerability_reports/TALOS-2025-2156 | Exploit Third Party Advisory |
| https://www.talosintelligence.com/vulnerability_reports/TALOS-2025-2156 |
Configurations
History
03 Nov 2025, 20:18
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
|
| References | () https://talosintelligence.com/vulnerability_reports/TALOS-2025-2156 - Exploit, Third Party Advisory | |
| CPE | cpe:2.3:a:meddream:pacs_server:7.3.2.840:*:*:*:premium:*:*:* | |
| CWE | NVD-CWE-noinfo | |
| First Time |
Meddream pacs Server
Meddream |
29 Jul 2025, 14:14
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
28 Jul 2025, 14:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-07-28 14:15
Updated : 2025-11-03 20:18
NVD link : CVE-2025-27724
Mitre link : CVE-2025-27724
CVE.ORG link : CVE-2025-27724
JSON object : View
Products Affected
meddream
- pacs_server
CWE
