Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| https://github.com/wolfSSL/wolfssh/pull/859 |
|
Mon, 12 Jan 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:wolfssh:wolfssh:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Wed, 07 Jan 2026 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wolfssh
Wolfssh wolfssh |
|
| Vendors & Products |
Wolfssh
Wolfssh wolfssh |
Tue, 06 Jan 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 06 Jan 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A heap buffer over-read vulnerability exists in the wolfSSH_CleanPath() function in wolfSSH. An authenticated remote attacker can trigger the issue via crafted SCP path input containing '/./' sequences, resulting in a heap over read by 1 byte. | |
| Title | Client SCP Request Triggers Buffer Overread by 1 Byte | |
| Weaknesses | CWE-125 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: wolfSSL
Published:
Updated: 2026-01-06T18:13:28.245Z
Reserved: 2025-12-30T22:23:40.830Z
Link: CVE-2025-15382
Updated: 2026-01-06T18:13:11.796Z
Status : Analyzed
Published: 2026-01-06T18:15:42.400
Modified: 2026-01-12T17:57:20.847
Link: CVE-2025-15382
No data.
OpenCVE Enrichment
Updated: 2026-01-07T10:08:23Z