CVE-2018-25298
Description
Merge PACS 7.0 contains a cross-site request forgery vulnerability that allows attackers to perform unauthorized actions by crafting malicious HTML forms targeting the merge-viewer endpoint. Attackers can submit POST requests to /servlet/actions/merge-viewer/summary with login credentials to hijack user sessions and gain unauthorized access to the PACS system.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Merge PACS 7.0 is vulnerable to CSRF; an attacker can trick a user into submitting a crafted form to hijack their session or log into the system with arbitrary credentials.
Merge PACS 7.0 contains a cross-site request forgery (CSRF) vulnerability in the merge-viewer endpoint. The application fails to implement anti-CSRF tokens or origin checks on the /servlet/actions/merge-viewer/summary POST handler, allowing an attacker to forge requests that perform actions on behalf of an authenticated user [2][3]. Root cause is the lack of CSRF protections for session-sensitive operations.
Exploitation requires no authentication; the attacker must trick an authenticated user into visiting a malicious HTML page. The proof-of-concept shows a hidden form that submits amicasUsername and password fields, effectively logging the victim into a session controlled by the attacker or performing actions as the victim [2]. The attack is network-based (AV:N) with low attack complexity (AC:L) and no privileges required (PR:N) [3].
Successful exploitation allows an attacker to hijack the victim's active session or execute unauthorized actions on the PACS system, potentially accessing or manipulating medical imaging data [3]. The CVSS v4 vector assigns a low confidentiality impact (VC:N, SC:L) and low integrity impact (VI:L, SI:L), indicating limited but real risk to data integrity and system trust.
Merative (formerly IBM Watson Health) is the vendor; while Merge PACS 7.0 is affected [1]. No patch information is provided in available references; users should monitor vendor advisories or apply general CSRF defenses such as token validation or same-site cookie policies. The vulnerability is not yet listed on CISA's Known Exploited Vulnerabilities catalog.
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3News mentions
0No linked articles in our index yet.