Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-xjvp-7243-rg9h | Wish has SCP Path Traversal that allows arbitrary file read/write |
Thu, 07 May 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Charmbracelet
Charmbracelet wish |
|
| Vendors & Products |
Charmbracelet
Charmbracelet wish |
Thu, 07 May 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 07 May 2026 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Wish is an SSH server with defaults and a collection of middlewares. From version 2.0.0 to before version 2.0.1, the SCP middleware in charm.land/wish/v2 is vulnerable to path traversal attacks. A malicious SCP client can read arbitrary files from the server, write arbitrary files to the server, and create directories outside the configured root directory by sending crafted filenames containing ../ sequences over the SCP protocol. This issue has been patched in version 2.0.1. | |
| Title | Wish has SCP Path Traversal that allows arbitrary file read/write | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-07T14:41:57.990Z
Reserved: 2026-04-21T14:15:21.960Z
Link: CVE-2026-41589
Updated: 2026-05-07T14:41:49.769Z
Status : Awaiting Analysis
Published: 2026-05-07T14:16:02.853
Modified: 2026-05-07T16:16:19.833
Link: CVE-2026-41589
No data.
OpenCVE Enrichment
Updated: 2026-05-07T21:24:43Z
Github GHSA