{"id":"CVE-2026-32711","summary":"pydicom: Path traversal in FileSet/DICOMDIR ReferencedFileID allows file access outside the File-set root","details":"pydicom is a pure Python package for working with DICOM files. Versions 2.0.0-rc.1 through 3.0.1 are vulnerable to Path Traversal through a maliciously crafted DICOMDIR ReferencedFileID when it is set to a path outside the File-set root. pydicom resolves the path only to confirm that it exists, but does not verify that the resolved path remains under the File-set root. Subsequent public FileSet operations such as copy(), write(), and remove()+write(use_existing=True) use that unchecked path in file I/O operations. This allows arbitrary file read/copy and, in some flows, move/delete outside the File-set root. This issue has been fixed in version 3.0.2.","aliases":["GHSA-v856-2rf8-9f28"],"modified":"2026-04-10T05:43:12.056941Z","published":"2026-03-20T01:26:15.182Z","related":["openSUSE-SU-2026:10412-1"],"database_specific":{"cwe_ids":["CWE-22"],"cna_assigner":"GitHub_M","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/32xxx/CVE-2026-32711.json"},"references":[{"type":"WEB","url":"https://github.com/pydicom/pydicom/releases/tag/v3.0.2"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/32xxx/CVE-2026-32711.json"},{"type":"ADVISORY","url":"https://github.com/pydicom/pydicom/security/advisories/GHSA-v856-2rf8-9f28"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-32711"},{"type":"FIX","url":"https://github.com/pydicom/pydicom/commit/6414f01a053dff925578799f5a7208d2ae585e82"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/pydicom/pydicom","events":[{"introduced":"b4ff70affe40fb1054b98ff049c2a6392e3e29cd"},{"fixed":"20aa4b73aef76bffb6fbc46a8827588dfa9bb89d"}]}],"versions":["v2.0.0","v2.0.0-rc.1","v2.1.0","v2.2.0-rc.1","v2.3.0","v2.4.0","v3.0.0","v3.0.0-rc1","v3.0.1"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-32711.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}