Description
A heap buffer over-read vulnerability exists in the wolfSSH_CleanPath() function in wolfSSH. An authenticated remote attacker can trigger the issue via crafted SCP path input containing '/./' sequences, resulting in a heap over read by 1 byte.
References (1)
Core 1
Core References
Issue Tracking
https://github.com/wolfSSL/wolfssh/pull/859
Scores
CVSS v3
8.1
EPSS
0.0016
EPSS Percentile
36.0%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-125
Status
published
Products (1)
wolfssh/wolfssh
1.4.12 - 1.4.22
Published
Jan 06, 2026
Tracked Since
Feb 18, 2026