CVE-2026-32711: Path Traversal and Arbitrary File Operations in pydicom FileSet
Vulnerability ID: CVE-2026-32711
CVSS Score: 7.8
Published: 2026-03-20
CVE-2026-32711 is a high-severity path traversal vulnerability in the pydicom Python library, affecting versions 2.0.0-rc.1 through 3.0.1. The flaw resides in the FileSet implementation, where insufficient validation of the ReferencedFileID attribute allows malicious DICOMDIR files to perform out-of-bounds file reads, copies, or deletions.
TL;DR
A path traversal vulnerability (CWE-22) in pydicom's FileSet parsing allows local arbitrary file operations via maliciously crafted DICOMDIR files. Update to version 3.0.2 or 2.4.5 to mitigate.
⚠️ Exploit Status: POC
Technical Details
- CWE ID: CWE-22
- Attack Vector: Local
- CVSS Score: 7.8
- EPSS Score: 0.00016
- Impact: High (Confidentiality, Integrity, Availability)
- Exploit Status: Proof of Concept
- CISA KEV: False
Affected Systems
- pydicom
-
pydicom: >= 2.0.0-rc.1, <= 3.0.1 (Fixed in:
3.0.2)
Code Analysis
Commit: 6414f01
Main branch fix for path traversal vulnerability in FileSet
Commit: ed4ddea
Backport fix for path traversal vulnerability in FileSet to v2.4.5
Mitigation Strategies
- Upgrade to a patched version of pydicom (3.0.2 or 2.4.5).
- Execute pydicom scripts processing untrusted data in unprivileged, isolated containers.
- Enforce strict filesystem permissions, ensuring the Python process cannot read or write sensitive system files.
Remediation Steps:
- Identify all projects and virtual environments utilizing the pydicom library.
- Update the dependency using
pip install --upgrade pydicom>=3.0.2for 3.x environments. - Update the dependency using
pip install --upgrade pydicom>=2.4.5for 2.x environments. - Verify the installed version by running
python -c "import pydicom; print(pydicom.__version__)".
References
- Official CVE Record
- GitHub Security Advisory
- Fix Commit (Main)
- Fix Commit (v2.4.5 Backport)
- pydicom v3.0.2 Release Notes
Read the full report for CVE-2026-32711 on our website for more details including interactive diagrams and full exploit analysis.
Top comments (0)