CVE-2026-32711
HIGHpydicom: Path traversal in FileSet/DICOMDIR ReferencedFileID allows file access outside the File-set root
Title source: cnaDescription
pydicom is a pure Python package for working with DICOM files. Versions 2.0.0-rc.1 through 3.0.1 are vulnerable to Path Traversal through a maliciously crafted DICOMDIR ReferencedFileID when it is set to a path outside the File-set root. pydicom resolves the path only to confirm that it exists, but does not verify that the resolved path remains under the File-set root. Subsequent public FileSet operations such as copy(), write(), and remove()+write(use_existing=True) use that unchecked path in file I/O operations. This allows arbitrary file read/copy and, in some flows, move/delete outside the File-set root. This issue has been fixed in version 3.0.2.
References (3)
Scores
CVSS v3
7.8
EPSS
0.0001
EPSS Percentile
0.3%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
total
Details
CWE
CWE-22
Status
published
Products (2)
pydicom/pydicom
>= 2.0.0-rc.1, < 3.0.2
pypi/pydicom
3.0.0 - 3.0.2PyPI
Published
Mar 20, 2026
Tracked Since
Mar 20, 2026