| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-v856-2rf8-9f28 | pydicom has a path traversal in FileSet/DICOMDIR ReferencedFileID allows file access outside the File-set root |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 20 Mar 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 20 Mar 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Pydicom
Pydicom pydicom |
|
| Vendors & Products |
Pydicom
Pydicom pydicom |
Fri, 20 Mar 2026 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | pydicom is a pure Python package for working with DICOM files. Versions 2.0.0-rc.1 through 3.0.1 are vulnerable to Path Traversal through a maliciously crafted DICOMDIR ReferencedFileID when it is set to a path outside the File-set root. pydicom resolves the path only to confirm that it exists, but does not verify that the resolved path remains under the File-set root. Subsequent public FileSet operations such as copy(), write(), and remove()+write(use_existing=True) use that unchecked path in file I/O operations. This allows arbitrary file read/copy and, in some flows, move/delete outside the File-set root. This issue has been fixed in version 3.0.2. | |
| Title | pydicom: Path traversal in FileSet/DICOMDIR ReferencedFileID allows file access outside the File-set root | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-20T16:41:56.917Z
Reserved: 2026-03-13T14:33:42.824Z
Link: CVE-2026-32711
Updated: 2026-03-20T16:41:52.638Z
Status : Awaiting Analysis
Published: 2026-03-20T02:16:33.600
Modified: 2026-03-20T13:37:50.737
Link: CVE-2026-32711
No data.
OpenCVE Enrichment
Updated: 2026-03-20T10:43:30Z
Github GHSA