{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-08T12:28:11.402","vulnerabilities":[{"cve":{"id":"CVE-2026-25760","sourceIdentifier":"security-advisories@github.com","published":"2026-02-06T22:16:12.277","lastModified":"2026-02-19T18:02:59.793","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Sliver is a command and control framework that uses a custom Wireguard netstack. Prior to 1.6.11, a path traversal in the website content subsystem lets an authenticated operator read arbitrary files on the Sliver server host. This is an authenticated path traversal / arbitrary file read issue, and it can expose credentials, configs, and keys. This vulnerability is fixed in 1.6.11."},{"lang":"es","value":"Sliver es un framework de comando y control que utiliza un netstack Wireguard personalizado. Anterior a 1.6.11, un salto de ruta en el subsistema de contenido del sitio web permite a un operador autenticado leer archivos arbitrarios en el host del servidor Sliver. Esto es un problema de salto de ruta autenticado / lectura de archivos arbitrarios, y puede exponer credenciales, configuraciones y claves. Esta vulnerabilidad está corregida en 1.6.11."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":3.6}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Primary","description":[{"lang":"en","value":"CWE-22"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:bishopfox:sliver:*:*:*:*:*:*:*:*","versionEndExcluding":"1.6.11","matchCriteriaId":"9D797281-52C3-452C-8CAA-7E358D81CD3B"}]}]}],"references":[{"url":"https://github.com/BishopFox/sliver/commit/818127349ccec812876693c4ca74ebf4350ec6b7","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/BishopFox/sliver/security/advisories/GHSA-2286-hxv5-cmp2","source":"security-advisories@github.com","tags":["Exploit","Mitigation","Vendor Advisory"]}]}}]}