CVE-2026-32711

HIGH

pydicom: Path traversal in FileSet/DICOMDIR ReferencedFileID allows file access outside the File-set root

Title source: cna
STIX 2.1

Description

pydicom is a pure Python package for working with DICOM files. Versions 2.0.0-rc.1 through 3.0.1 are vulnerable to Path Traversal through a maliciously crafted DICOMDIR ReferencedFileID when it is set to a path outside the File-set root. pydicom resolves the path only to confirm that it exists, but does not verify that the resolved path remains under the File-set root. Subsequent public FileSet operations such as copy(), write(), and remove()+write(use_existing=True) use that unchecked path in file I/O operations. This allows arbitrary file read/copy and, in some flows, move/delete outside the File-set root. This issue has been fixed in version 3.0.2.

Scores

CVSS v3 7.8
EPSS 0.0001
EPSS Percentile 0.3%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation poc
Automatable no
Technical Impact total

Details

CWE
CWE-22
Status published
Products (2)
pydicom/pydicom >= 2.0.0-rc.1, < 3.0.2
pypi/pydicom 3.0.0 - 3.0.2PyPI
Published Mar 20, 2026
Tracked Since Mar 20, 2026