CVE-2018-25113
HIGHDicoogle PACS Web Server <2.5.0 - Path Traversal
Title source: llmDescription
An unauthenticated path traversal vulnerability exists in Dicoogle PACS Web Server version 2.5.0 and possibly earlier. The vulnerability allows remote attackers to read arbitrary files on the underlying system by sending a crafted request to the /exportFile endpoint using the UID parameter. Successful exploitation can reveal sensitive files accessible by the web server user.
Exploits (2)
exploitdb
WORKING POC
VERIFIED
by Carlos Avila · textwebappsmultiple
https://www.exploit-db.com/exploits/45007
metasploit
WORKING POC
by Carlos Avila, h00die · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/http/dicoogle_traversal.rb
References (4)
Scores
CVSS v4
8.7
EPSS
0.4283
EPSS Percentile
97.5%
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
Details
CWE
CWE-22
Status
published
Products (1)
Dicoogle Project/PACS Web Server
2.5.0
Published
Jul 23, 2025
Tracked Since
Feb 18, 2026