CVE-2026-43901
Severity CVSS v4.0:
Pending analysis
Type:
CWE-22
Path Traversal
Publication date:
11/05/2026
Last modified:
13/05/2026
Description
Wireshark MCP is an MCP Server that turns tshark into a structured analysis interface, then layers in optional Wireshark suite utilities. In 1.1.5 and earlier, wireshark-mcp exposes a wireshark_export_objects MCP tool that accepts an attacker-controlled dest_dir parameter and passes it to tshark's --export-objects flag with no mandatory path restriction. The path sandbox (_allowed_dirs) is None by default and only activates when the environment variable WIRESHARK_MCP_ALLOWED_DIRS is explicitly set. In a default installation, any directory on the filesystem can be used as the export destination.
Impact
Base Score 3.x
6.80
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:bx33661:wireshark_mcp:*:*:*:*:*:*:*:* | 1.1.5 (including) |
To consult the complete list of CPE names with products and versions, see this page



