Profile import path traversal in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service and possible code execution

Project Subscriptions

Vendors Products
Wireshark Subscribe
Wireshark Subscribe
Advisories
Source ID Title
Debian DSA Debian DSA DSA-6249-1 wireshark security update
Fixes

Solution

Upgrade to version 4.6.5 or above


Workaround

No workaround given by the vendor.

History

Tue, 05 May 2026 00:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Important


Fri, 01 May 2026 19:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*

Fri, 01 May 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 01 May 2026 00:45:00 +0000

Type Values Removed Values Added
First Time appeared Wireshark
Wireshark wireshark
Vendors & Products Wireshark
Wireshark wireshark

Thu, 30 Apr 2026 23:30:00 +0000

Type Values Removed Values Added
Description Profile import path traversal in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service and possible code execution
Title Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Wireshark
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 7, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitLab

Published:

Updated: 2026-05-02T03:55:29.128Z

Reserved: 2026-04-06T06:34:06.344Z

Link: CVE-2026-5656

cve-icon Vulnrichment

Updated: 2026-05-01T14:17:17.768Z

cve-icon NVD

Status : Analyzed

Published: 2026-05-01T00:16:25.097

Modified: 2026-05-01T19:23:19.983

Link: CVE-2026-5656

cve-icon Redhat

Severity : Important

Publid Date: 2026-04-30T23:03:58Z

Links: CVE-2026-5656 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-01T05:00:12Z

Weaknesses