CVE-2026-32711

Source
https://cve.org/CVERecord?id=CVE-2026-32711
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-32711.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-32711
Aliases
Downstream
Related
Published
2026-03-20T01:26:15.182Z
Modified
2026-04-10T05:43:12.056941Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVSS Calculator
Summary
pydicom: Path traversal in FileSet/DICOMDIR ReferencedFileID allows file access outside the File-set root
Details

pydicom is a pure Python package for working with DICOM files. Versions 2.0.0-rc.1 through 3.0.1 are vulnerable to Path Traversal through a maliciously crafted DICOMDIR ReferencedFileID when it is set to a path outside the File-set root. pydicom resolves the path only to confirm that it exists, but does not verify that the resolved path remains under the File-set root. Subsequent public FileSet operations such as copy(), write(), and remove()+write(use_existing=True) use that unchecked path in file I/O operations. This allows arbitrary file read/copy and, in some flows, move/delete outside the File-set root. This issue has been fixed in version 3.0.2.

Database specific
{
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/32xxx/CVE-2026-32711.json",
    "cwe_ids": [
        "CWE-22"
    ]
}
References

Affected packages

Git / github.com/pydicom/pydicom

Affected ranges

Type
GIT
Repo
https://github.com/pydicom/pydicom
Events

Affected versions

v2.*
v2.0.0
v2.0.0-rc.1
v2.1.0
v2.2.0-rc.1
v2.3.0
v2.4.0
v3.*
v3.0.0
v3.0.0-rc1
v3.0.1

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-32711.json"