Magic Wormhole makes it possible to get arbitrary-sized files and directories from one computer to another. From 0.21.0 to before 0.23.0, receiving a file (wormhole receive) from a malicious party could result in overwriting critical local files, including ~/.ssh/authorized_keys and .bashrc. This could be used to compromise the receiver's computer. Only the sender of the file (the party who runs wormhole send) can mount the attack. Other parties (including the transit/relay servers) are excluded by the wormhole protocol. This vulnerability is fixed in 0.23.0.
References
| Link | Resource |
|---|---|
| https://github.com/magic-wormhole/magic-wormhole/security/advisories/GHSA-4g4c-mfqg-pj8r | Mitigation Vendor Advisory |
Configurations
History
16 Mar 2026, 18:02
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Magic-wormhole Project magic Wormhole
Magic-wormhole Project |
|
| CPE | cpe:2.3:a:magic-wormhole_project:magic_wormhole:*:*:*:*:*:python:*:* | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.1 |
| Summary |
|
|
| References | () https://github.com/magic-wormhole/magic-wormhole/security/advisories/GHSA-4g4c-mfqg-pj8r - Mitigation, Vendor Advisory |
12 Mar 2026, 18:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-12 18:16
Updated : 2026-03-16 18:02
NVD link : CVE-2026-32116
Mitre link : CVE-2026-32116
CVE.ORG link : CVE-2026-32116
JSON object : View
Products Affected
magic-wormhole_project
- magic_wormhole
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
