Intel

AIKIDO-2026-10065

wolfSSL.wolfssh is vulnerable to Out-of-bounds Read

Out-of-bounds ReadCVE-2025-15382

51

Medium Risk

This Affects:

C++wolfSSL.wolfssh
0.0.1 - 1.4.21
Fixed in 1.4.22

TL;DR

A heap buffer over-read vulnerability exists in the wolfSSH_CleanPath() function in wolfSSH. An authenticated remote attacker can trigger this issue by supplying a crafted SCP path containing /./ sequences, causing a one-byte heap over-read.

Who does this affect?

You are affected if you are using a version that falls within the vulnerable range.

Background info

wolfSSL.wolfssh is vulnerable to Out-of-bounds Read in versions 0.0.1 - 1.4.21.

How to fix this

Upgrade the wolfSSL.wolfssh library to the patch version.