A XSS payload can be uploaded as a DICOM study and when a user tries to view the infected study inside the Osimis WebViewer the XSS vulnerability gets triggered. If exploited, the attacker will be able to execute arbitrary JavaScript code inside the victim's browser.
Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-59419 | A XSS payload can be uploaded as a DICOM study and when a user tries to view the infected study inside the Osimis WebViewer the XSS vulnerability gets triggered. If exploited, the attacker will be able to execute arbitrary JavaScript code inside the victim's browser. |
Solution
Orthanc recommends users mitigate this vulnerability by updating to the Docker images and Windows installers to Orthanc version 24.1.2 or greater. Review Orthanc's security bullentin https://discourse.orthanc-server.org/t/osimis-web-viewer-1-4-3/4206 for more details.
Workaround
No workaround given by the vendor.
Tue, 17 Jun 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-06-17T21:19:26.897Z
Reserved: 2024-01-22T16:41:11.753Z
Link: CVE-2023-7238
Updated: 2024-08-02T08:57:35.227Z
Status : Modified
Published: 2024-01-23T20:15:45.413
Modified: 2024-11-21T08:45:35.027
Link: CVE-2023-7238
No data.
OpenCVE Enrichment
No data.
EUVD