Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2026-41589 β€” AI Deep Analysis Summary

CVSS 9.6 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: A Path Traversal flaw in Wish SCP middleware. πŸ“‰ **Consequences**: Attackers can read/write **arbitrary files** and create directories outside the allowed root.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: **CWE-22** (Path Traversal). The SCP middleware fails to sanitize input. It allows `../` sequences to escape the designated directory boundary. 🚫 No proper validation of file paths.

Q3Who is affected? (Versions/Components)

🎯 **Affected**: **charmbracelet/wish**. Specifically versions **2.0.0** up to (but not including) **2.0.1**. πŸ“¦ Any server using this specific SCP middleware configuration is at risk.

Q4What can hackers do? (Privileges/Data)

πŸ’€ **Capabilities**: πŸ“– **Read**: Access sensitive server files. ✍️ **Write**: Inject malicious files. πŸ“‚ **Create**: Make directories outside the chroot/root. ⚠️ High impact on Confidentiality & Integrity.

Q5Is exploitation threshold high? (Auth/Config)

πŸ”‘ **Threshold**: **Medium**. Requires **PR:L** (Low Privileges). You need valid SSH credentials to connect. 🚢 Not remote unauthenticated, but easy for any valid user to exploit.

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ§ͺ **Exploit Status**: No public PoC listed in data. πŸ•΅οΈ However, path traversal is a standard technique. Wild exploitation is likely if attackers know the target uses Wish SCP. πŸ•ΈοΈ

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: 1. Check Wish version (`< 2.0.1`). 2. Scan for SCP service on SSH port. 3. Test if `../` in filenames escapes the root dir. πŸ§ͺ Use standard path traversal payloads.

Q8Is it fixed officially? (Patch/Mitigation)

βœ… **Fixed**: Yes! Patched in **v2.0.1**. πŸ› οΈ Upgrade immediately. Reference: [GitHub Advisory](https://github.com/charmbracelet/wish/security/advisories/GHSA-xjvp-7243-rg9h).

Q9What if no patch? (Workaround)

🚧 **No Patch?**: Disable SCP middleware if not needed. 🚫 Restrict user permissions. πŸ›‘ Implement strict path validation at the application level. Isolate the service.

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: **HIGH**. CVSS Score indicates High Impact. πŸ“… Published May 2026. Update to v2.0.1 ASAP to prevent arbitrary file access. Don't wait!