PacsOne Server version 6.6.2 (prior versions are likely affected) contains a directory traversal vulnerability within the web-based DICOM viewer component. Successful exploitation allows a remote unauthenticated attacker to read arbitrary files via the 'nocache.php' endpoint with a crafted 'path' parameter. Exploitation evidence was observed by the Shadowserver Foundation on 2025-02-07 UTC.
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 12 Nov 2025 13:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Rainbowfishsoftware
Rainbowfishsoftware pacsone Server |
|
| Vendors & Products |
Rainbowfishsoftware
Rainbowfishsoftware pacsone Server |
Mon, 10 Nov 2025 22:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | PacsOne Server version 6.6.2 (prior versions are likely affected) contains a directory traversal vulnerability within the web-based DICOM viewer component. Successful exploitation allows a remote unauthenticated attacker to read arbitrary files via the 'nocache.php' endpoint with a crafted 'path' parameter. Exploitation evidence was observed by the Shadowserver Foundation on 2025-02-07 UTC. | |
| Title | PacsOne Server 6.6.2 DICOM Web Viewer Directory Traversal LFI | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2025-11-10T22:33:18.179Z
Reserved: 2025-10-29T21:01:03.317Z
Link: CVE-2018-25124
No data.
Status : Awaiting Analysis
Published: 2025-11-10T23:15:39.840
Modified: 2025-11-12T16:19:59.103
Link: CVE-2018-25124
No data.
OpenCVE Enrichment
Updated: 2025-11-12T12:48:10Z