CVE-2026-32711
Severity CVSS v4.0:
Pending analysis
Type:
CWE-22
Path Traversal
Publication date:
20/03/2026
Last modified:
23/03/2026
Description
pydicom is a pure Python package for working with DICOM files. Versions 2.0.0-rc.1 through 3.0.1 are vulnerable to Path Traversal through a maliciously crafted DICOMDIR ReferencedFileID when it is set to a path outside the File-set root. pydicom resolves the path only to confirm that it exists, but does not verify that the resolved path remains under the File-set root. Subsequent public FileSet operations such as copy(), write(), and remove()+write(use_existing=True) use that unchecked path in file I/O operations. This allows arbitrary file read/copy and, in some flows, move/delete outside the File-set root. This issue has been fixed in version 3.0.2.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:pydicom:pydicom:*:*:*:*:*:python:*:* | 2.0.0 (including) | 3.0.2 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



