Improper host authentication vulnerability in wolfSSH version 1.4.20 and earlier clients that allows authentication bypass and leaking of clients credentials.
Advisories

No advisories yet.

Fixes

Solution

Applying this patch ( https://patch-diff.githubusercontent.com/raw/wolfSSL/wolfssh/pull/840.diff ) to versions 1.4.20 and older or updating version of wolfSSH used.


Workaround

No workaround given by the vendor.

History

Fri, 05 Dec 2025 05:45:00 +0900

Type Values Removed Values Added
CPEs cpe:2.3:a:wolfssh:wolfssh:*:*:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Thu, 23 Oct 2025 19:30:00 +0900

Type Values Removed Values Added
First Time appeared Wolfssh
Wolfssh wolfssh
Vendors & Products Wolfssh
Wolfssh wolfssh

Tue, 21 Oct 2025 23:15:00 +0900

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 21 Oct 2025 22:45:00 +0900

Type Values Removed Values Added
Description Improper host authentication vulnerability in wolfSSH version 1.4.20 and earlier clients that allows authentication bypass and leaking of clients credentials.
Title Host verification bypass and credential leak
Weaknesses CWE-287
References
Metrics cvssV4_0

{'score': 9.4, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/AU:Y/U:Red'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: wolfSSL

Published:

Updated: 2026-01-06T17:45:15.401Z

Reserved: 2025-10-10T21:06:46.601Z

Link: CVE-2025-11625

cve-icon Vulnrichment

Updated: 2025-10-21T14:04:10.794Z

cve-icon NVD

Status : Analyzed

Published: 2025-10-21T14:15:46.997

Modified: 2025-12-04T20:43:02.470

Link: CVE-2025-11625

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-10-23T19:13:08Z

Weaknesses