Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25760: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in BishopFox sliver

0
Medium
VulnerabilityCVE-2026-25760cvecve-2026-25760cwe-22
Published: Fri Feb 06 2026 (02/06/2026, 21:32:27 UTC)
Source: CVE Database V5
Vendor/Project: BishopFox
Product: sliver

Description

Sliver is a command and control framework that uses a custom Wireguard netstack. Prior to 1.6.11, a path traversal in the website content subsystem lets an authenticated operator read arbitrary files on the Sliver server host. This is an authenticated path traversal / arbitrary file read issue, and it can expose credentials, configs, and keys. This vulnerability is fixed in 1.6.11.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/14/2026, 12:13:03 UTC

Technical Analysis

CVE-2026-25760 is a path traversal vulnerability classified under CWE-22 found in the Sliver command and control (C2) framework developed by BishopFox. Sliver uses a custom Wireguard netstack to facilitate secure communications between operators and implants. Prior to version 1.6.11, the website content subsystem of Sliver improperly limits pathname inputs, allowing an authenticated operator to perform path traversal attacks. This vulnerability enables the attacker to read arbitrary files on the server hosting Sliver, bypassing intended directory restrictions. Since the attacker must be an authenticated operator, the threat actor already has some level of access, but this flaw significantly escalates their ability to access sensitive data. The arbitrary file read can expose critical information such as credentials, configuration files, and cryptographic keys, which could be leveraged for further compromise or lateral movement. The vulnerability does not affect the integrity or availability of the system directly but compromises confidentiality. The CVSS 3.1 base score is 6.5, reflecting network attack vector, low attack complexity, required privileges, no user interaction, unchanged scope, and high confidentiality impact. No public exploits or active exploitation have been reported to date. The issue is resolved in Sliver version 1.6.11, which properly sanitizes and restricts pathname inputs in the website content subsystem.

Potential Impact

For European organizations, the impact of CVE-2026-25760 centers on the potential exposure of sensitive operational data within Sliver C2 servers. Organizations using Sliver for red teaming, penetration testing, or adversary simulation could have their internal credentials, configuration files, and cryptographic keys exposed if an attacker gains authenticated operator access. This could lead to unauthorized access to other internal systems, compromise of simulated attack infrastructure, and leakage of sensitive security tooling details. While the vulnerability requires authenticated access, insider threats or compromised operator credentials could enable exploitation. The confidentiality breach could undermine trust in security assessments and expose organizations to further attacks. Given Sliver's use in offensive security, the exposure of keys and configs could also aid threat actors in mimicking or evading detection by leveraging stolen C2 infrastructure details. European critical infrastructure sectors and large enterprises that rely on advanced red teaming tools are particularly at risk. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially if attackers develop exploits or insider threats emerge.

Mitigation Recommendations

The primary mitigation is to upgrade all Sliver instances to version 1.6.11 or later, where the path traversal vulnerability is fixed. Organizations should implement strict access controls to limit operator accounts to trusted personnel only and enforce strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of credential compromise. Regularly audit operator activity logs for suspicious file access patterns that may indicate exploitation attempts. Network segmentation should be employed to isolate Sliver servers from broader enterprise networks to limit lateral movement if compromised. Additionally, encrypt sensitive configuration files and keys at rest to reduce the impact of arbitrary file reads. Employ runtime application self-protection (RASP) or web application firewalls (WAF) that can detect and block path traversal attempts targeting the website content subsystem. Finally, conduct periodic security reviews of offensive security tooling environments to ensure they are patched and securely configured.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-05T18:35:52.357Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69866468f9fa50a62f36cd1e

Added to database: 2/6/2026, 10:00:08 PM

Last enriched: 2/14/2026, 12:13:03 PM

Last updated: 3/23/2026, 11:21:25 PM

Views: 111

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses