Home

Description

Wireshark MCP is an MCP Server that turns tshark into a structured analysis interface, then layers in optional Wireshark suite utilities. In 1.1.5 and earlier, wireshark-mcp exposes a wireshark_export_objects MCP tool that accepts an attacker-controlled dest_dir parameter and passes it to tshark's --export-objects flag with no mandatory path restriction. The path sandbox (_allowed_dirs) is None by default and only activates when the environment variable WIRESHARK_MCP_ALLOWED_DIRS is explicitly set. In a default installation, any directory on the filesystem can be used as the export destination.

PUBLISHED Reserved 2026-05-04 | Published 2026-05-11 | Updated 2026-05-13 | Assigner GitHub_M




MEDIUM: 6.8CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N

Problem types

CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Product status

<= 1.1.5
affected

References

github.com/...rk-MCP/security/advisories/GHSA-3r68-x3xc-rxpg exploit

github.com/...rk-MCP/security/advisories/GHSA-3r68-x3xc-rxpg

cve.org (CVE-2026-43901)

nvd.nist.gov (CVE-2026-43901)

Download JSON