A heap buffer over-read vulnerability exists in the wolfSSH_CleanPath() function in wolfSSH. An authenticated remote attacker can trigger the issue via crafted SCP path input containing '/./' sequences, resulting in a heap over read by 1 byte.
{ "versions": [ { "introduced": "1.4.12" }, { "fixed": "1.4.22" } ] }
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-15382.json"