Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-v856-2rf8-9f28 | pydicom has a path traversal in FileSet/DICOMDIR ReferencedFileID allows file access outside the File-set root |
Mon, 23 Mar 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:pydicom:pydicom:*:*:*:*:*:python:*:* |
Fri, 20 Mar 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 20 Mar 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Pydicom
Pydicom pydicom |
|
| Vendors & Products |
Pydicom
Pydicom pydicom |
Fri, 20 Mar 2026 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | pydicom is a pure Python package for working with DICOM files. Versions 2.0.0-rc.1 through 3.0.1 are vulnerable to Path Traversal through a maliciously crafted DICOMDIR ReferencedFileID when it is set to a path outside the File-set root. pydicom resolves the path only to confirm that it exists, but does not verify that the resolved path remains under the File-set root. Subsequent public FileSet operations such as copy(), write(), and remove()+write(use_existing=True) use that unchecked path in file I/O operations. This allows arbitrary file read/copy and, in some flows, move/delete outside the File-set root. This issue has been fixed in version 3.0.2. | |
| Title | pydicom: Path traversal in FileSet/DICOMDIR ReferencedFileID allows file access outside the File-set root | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-20T16:41:56.917Z
Reserved: 2026-03-13T14:33:42.824Z
Link: CVE-2026-32711
Updated: 2026-03-20T16:41:52.638Z
Status : Analyzed
Published: 2026-03-20T02:16:33.600
Modified: 2026-03-23T17:02:26.190
Link: CVE-2026-32711
No data.
OpenCVE Enrichment
Updated: 2026-03-25T14:10:09Z
Github GHSA