A security vulnerability has been detected in libssh2 up to 1.11.1. The impacted element is the function userauthpassword of the file src/userauth.c. Such manipulation of the argument usernamelen/password_len leads to integer overflow. The attack may be launched remotely. The name of the patch is 256d04b60d80bf1190e96b0ad1e91b2174d744b1. A patch should be applied to remediate this issue.
{
"sources": [
{
"id": "CVE-2026-7598",
"database_specific": {
"status": "Analyzed"
},
"imported": "2026-05-07T17:13:44.796Z",
"url": "https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2026-7598",
"html_url": "https://nvd.nist.gov/vuln/detail/CVE-2026-7598",
"modified": "2026-05-07T01:47:08.857Z",
"published": "2026-05-01T22:16:16.947Z"
}
],
"license": "CC-BY-4.0"
}