Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-3r68-x3xc-rxpg | wireshark-mcp vulnerable to arbitrary file write via export_objects when WIRESHARK_MCP_ALLOWED_DIRS is not configured |
Wed, 13 May 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Bx33661 wireshark Mcp
|
|
| CPEs | cpe:2.3:a:bx33661:wireshark_mcp:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Bx33661 wireshark Mcp
|
Wed, 13 May 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 12 May 2026 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Bx33661
Bx33661 wireshark-mcp |
|
| Vendors & Products |
Bx33661
Bx33661 wireshark-mcp |
Mon, 11 May 2026 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Wireshark MCP is an MCP Server that turns tshark into a structured analysis interface, then layers in optional Wireshark suite utilities. In 1.1.5 and earlier, wireshark-mcp exposes a wireshark_export_objects MCP tool that accepts an attacker-controlled dest_dir parameter and passes it to tshark's --export-objects flag with no mandatory path restriction. The path sandbox (_allowed_dirs) is None by default and only activates when the environment variable WIRESHARK_MCP_ALLOWED_DIRS is explicitly set. In a default installation, any directory on the filesystem can be used as the export destination. | |
| Title | Wireshark MCP: Arbitrary file write via export_objects when WIRESHARK_MCP_ALLOWED_DIRS is not configured | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-13T14:38:55.840Z
Reserved: 2026-05-04T16:11:33.085Z
Link: CVE-2026-43901
Updated: 2026-05-13T14:28:25.676Z
Status : Modified
Published: 2026-05-11T23:20:21.697
Modified: 2026-05-13T16:16:52.987
Link: CVE-2026-43901
No data.
OpenCVE Enrichment
Updated: 2026-05-12T09:22:15Z
Github GHSA