CVE-2018-25113
Dicoogle PACS Web Server <2.5.0 - Path Traversal
Title source: llmDescription
An unauthenticated path traversal vulnerability exists in Dicoogle PACS Web Server version 2.5.0 and possibly earlier. The vulnerability allows remote attackers to read arbitrary files on the underlying system by sending a crafted request to the /exportFile endpoint using the UID parameter. Successful exploitation can reveal sensitive files accessible by the web server user.
Exploits (2)
metasploit
WORKING POC
by Carlos Avila, h00die · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/http/dicoogle_traversal.rb
exploitdb
WORKING POC
VERIFIED
by Carlos Avila · textwebappsmultiple
https://www.exploit-db.com/exploits/45007
References (4)
Scores
EPSS
0.3865
EPSS Percentile
97.2%
Classification
CWE
CWE-22
Status
draft
Timeline
Published
Jul 23, 2025
Tracked Since
Feb 18, 2026