Home

Description

Wish is an SSH server with defaults and a collection of middlewares. From version 2.0.0 to before version 2.0.1, the SCP middleware in charm.land/wish/v2 is vulnerable to path traversal attacks. A malicious SCP client can read arbitrary files from the server, write arbitrary files to the server, and create directories outside the configured root directory by sending crafted filenames containing ../ sequences over the SCP protocol. This issue has been patched in version 2.0.1.

PUBLISHED Reserved 2026-04-21 | Published 2026-05-07 | Updated 2026-05-07 | Assigner GitHub_M




CRITICAL: 9.6CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N

Problem types

CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Product status

>= 2.0.0, < 2.0.1
affected

References

github.com/...t/wish/security/advisories/GHSA-xjvp-7243-rg9h exploit

github.com/...t/wish/security/advisories/GHSA-xjvp-7243-rg9h

github.com/charmbracelet/wish/releases/tag/v2.0.1

cve.org (CVE-2026-41589)

nvd.nist.gov (CVE-2026-41589)

Download JSON