GHSA-4g4c-mfqg-pj8r

Suggest an improvement
Source
https://github.com/advisories/GHSA-4g4c-mfqg-pj8r
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/03/GHSA-4g4c-mfqg-pj8r/GHSA-4g4c-mfqg-pj8r.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-4g4c-mfqg-pj8r
Aliases
Published
2026-03-13T15:40:20Z
Modified
2026-03-13T20:03:43.956158Z
Severity
  • 8.2 (High) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:N/VI:H/VA:N/SC:N/SI:H/SA:N CVSS Calculator
Summary
Magic Wormhole: "wormhole receive" allows arbitrary local file overwrite
Details

Impact

What kind of vulnerability is it? Who is impacted?

Receiving a file (wormhole receive) from a malicious party could result in overwriting critical local files, including ~/.ssh/authorized_keys and .bashrc. This could be used to compromise the receiver's computer.

Only the sender of the file (the party who runs wormhole send) can mount the attack. Other parties (including the transit/relay servers) are excluded by the wormhole protocol.

Patches

Has the problem been patched? What versions should users upgrade to?

The bug has been fixed in magic-wormhole 0.23.0. All users should upgrade to this version.

The vulnerability first surfaced in the 0.21.0 release on 23-Oct-2025.

Workarounds

Is there a way for users to fix or remediate the vulnerability without upgrading?

As a workaround, the receiver can override the sender's filename with the --output or -o option. For example: wormhole receive -o shopping-list.txt will write the file to shopping-list.txt in the local directory, regardless of what the sender tries to do. To be effective, this option must be added to every invocation of wormhole receive / wormhole rx.

References

Are there any links users can visit to find out more?

Incoming file transfer requests include a filename, used to decide where the file contents will be written. Well-behaving senders compute this from the basename() of the sent file (which discards all but the last segment of the path). To guard against malicious senders, the receiver also applies basename() to the incoming filename. During refactoring in version 0.21.0, this receiver-side check was accidentally dropped. The check was restored in version 0.23.0 along with a unit test.

Many thanks to Ian McKenzie (@ikmckenz) for spotting the bug and reaching out with a fix.

Database specific
{
    "github_reviewed": true,
    "nvd_published_at": "2026-03-12T18:16:24Z",
    "cwe_ids": [
        "CWE-22"
    ],
    "github_reviewed_at": "2026-03-13T15:40:20Z",
    "severity": "HIGH"
}
References

Affected packages

PyPI / magic-wormhole

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0.21.0
Fixed
0.23.0

Affected versions

0.*
0.21.0
0.21.1
0.22.0

Database specific

source
"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/03/GHSA-4g4c-mfqg-pj8r/GHSA-4g4c-mfqg-pj8r.json"