CVE-2018-25113

Dicoogle PACS Web Server <2.5.0 - Path Traversal

Title source: llm

Description

An unauthenticated path traversal vulnerability exists in Dicoogle PACS Web Server version 2.5.0 and possibly earlier. The vulnerability allows remote attackers to read arbitrary files on the underlying system by sending a crafted request to the /exportFile endpoint using the UID parameter. Successful exploitation can reveal sensitive files accessible by the web server user.

Exploits (2)

metasploit WORKING POC
by Carlos Avila, h00die · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/http/dicoogle_traversal.rb
exploitdb WORKING POC VERIFIED
by Carlos Avila · textwebappsmultiple
https://www.exploit-db.com/exploits/45007

Scores

EPSS 0.3865
EPSS Percentile 97.2%

Classification

CWE
CWE-22
Status draft

Timeline

Published Jul 23, 2025
Tracked Since Feb 18, 2026