CVE-2025-15382

A heap buffer over-read vulnerability exists in the wolfSSH_CleanPath() function in wolfSSH. An authenticated remote attacker can trigger the issue via crafted SCP path input containing '/./' sequences, resulting in a heap over read by 1 byte.
References
Link Resource
https://github.com/wolfSSL/wolfssh/pull/859 Issue Tracking
Configurations

Configuration 1 (hide)

cpe:2.3:a:wolfssh:wolfssh:*:*:*:*:*:*:*:*

History

12 Jan 2026, 17:57

Type Values Removed Values Added
First Time Wolfssh
Wolfssh wolfssh
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.1
References () https://github.com/wolfSSL/wolfssh/pull/859 - () https://github.com/wolfSSL/wolfssh/pull/859 - Issue Tracking
CPE cpe:2.3:a:wolfssh:wolfssh:*:*:*:*:*:*:*:*

06 Jan 2026, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2026-01-06 18:15

Updated : 2026-01-12 17:57


NVD link : CVE-2025-15382

Mitre link : CVE-2025-15382

CVE.ORG link : CVE-2025-15382


JSON object : View

Products Affected

wolfssh

  • wolfssh
CWE
CWE-125

Out-of-bounds Read