Wireguard

10 CVEs product

Monthly

CVE-2026-29196 MEDIUM PATCH This Month

Netmaker versions prior to 1.5.0 expose WireGuard private keys through unauthenticated API endpoints when accessed by users with the platform-user role, allowing credential theft across all network configurations despite UI-level access restrictions. An authenticated attacker can retrieve sensitive cryptographic material by directly calling GET /api/extclients/{network} or GET /api/nodes/{network} endpoints that lack proper output filtering. This vulnerability affects Netmaker and its integrated WireGuard deployments, with no patch currently available for affected versions.

Wireguard Netmaker
NVD GitHub
CVSS 3.1
4.3
EPSS
0.0%
CVE-2026-29195 MEDIUM PATCH This Month

Netmaker versions prior to 1.5.0 fail to properly validate role assignments in the user update API endpoint, allowing authenticated admin users to escalate their privileges to super-admin. An attacker with admin credentials can exploit this authorization bypass to gain unrestricted access to the platform. No patch is currently available for affected installations.

Wireguard Netmaker
NVD GitHub
CVSS 3.1
6.5
EPSS
0.0%
CVE-2026-29781 MEDIUM POC This Month

Sliver C2 server versions 1.7.3 and earlier can be remotely crashed by authenticated attackers who craft malformed Protobuf messages that exploit missing nil-pointer validation in the unmarshalling logic. Public exploit code exists for this vulnerability, which causes a denial of service affecting all active implant sessions across the entire infrastructure, as the mTLS, WireGuard, and DNS transports lack panic recovery mechanisms. An attacker with captured implant credentials can instantly terminate the server process, requiring manual intervention to restore operations.

Dns Wireguard Sliver
NVD GitHub
CVSS 3.1
6.5
EPSS
0.1%
CVE-2026-29771 MEDIUM PATCH This Month

Repeated denial of service attacks against Netmaker versions prior to 1.2.0 are possible when authenticated users invoke the /api/server/shutdown endpoint to forcibly terminate the server process. An attacker with valid credentials can cyclically crash the Netmaker service, causing intermittent unavailability with approximately 3-second restart intervals. No patch is currently available for affected deployments.

Wireguard Denial Of Service Netmaker
NVD GitHub
CVSS 3.1
6.5
EPSS
0.0%
CVE-2026-29194 HIGH PATCH This Week

Netmaker versions prior to 1.5.0 fail to properly validate host JWT tokens during authorization, allowing any attacker with knowledge of target object identifiers to bypass access controls and read, modify, or delete resources across different hosts. The vulnerability affects critical operations including node management, host deletion, and failover configurations, requiring only a valid host token and network access to exploit. Update to version 1.5.0 or later to remediate.

Wireguard Netmaker
NVD GitHub
CVSS 3.1
8.1
EPSS
0.1%
CVE-2026-27899 HIGH PATCH This Week

Privilege escalation in WireGuard Portal prior to version 2.1.3 allows authenticated non-admin users to gain full administrator access by modifying their own user profile with an IsAdmin flag set to true. The vulnerability exists because the server fails to properly validate and restrict the IsAdmin field during profile updates, allowing the privilege change to persist after re-authentication. Affected deployments require immediate patching to version 2.1.3 or later to prevent unauthorized administrative access.

Docker Wireguard Wireguard Portal Suse
NVD GitHub
CVSS 3.1
8.8
EPSS
0.1%
CVE-2026-26963 MEDIUM PATCH This Month

Cilium versions 1.18.0-1.18.5 with Native Routing, WireGuard, and Node Encryption enabled incorrectly allow cross-node Pod traffic that should be blocked, enabling unauthorized network access between isolated workloads. An attacker with network access to pods on different nodes can bypass network segmentation policies to access restricted services. The vulnerability affects deployments using these specific Cilium configurations and is resolved in version 1.18.6.

Wireguard Cilium Redhat Suse
NVD GitHub
CVSS 3.1
6.1
EPSS
0.0%
CVE-2026-25791 HIGH POC PATCH This Week

Memory exhaustion in Sliver C2 framework prior to version 1.7.0 allows unauthenticated remote attackers to bypass OTP validation in the DNS listener and create unbounded server-side sessions without expiry mechanisms. Public exploit code exists for this vulnerability, enabling attackers to repeatedly allocate sessions and exhaust server memory resources. The DNS C2 listener accepts bootstrap messages without proper authentication even when OTP enforcement is enabled.

Dns Wireguard Sliver Suse
NVD GitHub
CVSS 3.1
7.5
EPSS
0.0%
CVE-2026-25760 MEDIUM POC PATCH This Month

Authenticated operators in Sliver C2 framework versions prior to 1.6.11 can read arbitrary files on the server through a path traversal vulnerability in the website content subsystem, potentially exposing sensitive credentials, configurations, and cryptographic keys. Public exploit code exists for this vulnerability. The issue is resolved in version 1.6.11 and later.

Wireguard Path Traversal Sliver Suse
NVD GitHub
CVSS 3.1
6.5
EPSS
0.0%
CVE-2022-50917 HIGH POC This Week

Protonvpn versions up to 1.26.0 contains a vulnerability that allows attackers to potentially execute arbitrary code (CVSS 7.8).

Wireguard Protonvpn
NVD Exploit-DB
CVSS 3.1
7.8
EPSS
0.0%
CVE-2026-29196
EPSS 0% CVSS 4.3
MEDIUM PATCH This Month

Netmaker versions prior to 1.5.0 expose WireGuard private keys through unauthenticated API endpoints when accessed by users with the platform-user role, allowing credential theft across all network configurations despite UI-level access restrictions. An authenticated attacker can retrieve sensitive cryptographic material by directly calling GET /api/extclients/{network} or GET /api/nodes/{network} endpoints that lack proper output filtering. This vulnerability affects Netmaker and its integrated WireGuard deployments, with no patch currently available for affected versions.

Wireguard Netmaker
NVD GitHub
CVE-2026-29195
EPSS 0% CVSS 6.5
MEDIUM PATCH This Month

Netmaker versions prior to 1.5.0 fail to properly validate role assignments in the user update API endpoint, allowing authenticated admin users to escalate their privileges to super-admin. An attacker with admin credentials can exploit this authorization bypass to gain unrestricted access to the platform. No patch is currently available for affected installations.

Wireguard Netmaker
NVD GitHub
CVE-2026-29781
EPSS 0% CVSS 6.5
MEDIUM POC This Month

Sliver C2 server versions 1.7.3 and earlier can be remotely crashed by authenticated attackers who craft malformed Protobuf messages that exploit missing nil-pointer validation in the unmarshalling logic. Public exploit code exists for this vulnerability, which causes a denial of service affecting all active implant sessions across the entire infrastructure, as the mTLS, WireGuard, and DNS transports lack panic recovery mechanisms. An attacker with captured implant credentials can instantly terminate the server process, requiring manual intervention to restore operations.

Dns Wireguard Sliver
NVD GitHub
CVE-2026-29771
EPSS 0% CVSS 6.5
MEDIUM PATCH This Month

Repeated denial of service attacks against Netmaker versions prior to 1.2.0 are possible when authenticated users invoke the /api/server/shutdown endpoint to forcibly terminate the server process. An attacker with valid credentials can cyclically crash the Netmaker service, causing intermittent unavailability with approximately 3-second restart intervals. No patch is currently available for affected deployments.

Wireguard Denial Of Service Netmaker
NVD GitHub
CVE-2026-29194
EPSS 0% CVSS 8.1
HIGH PATCH This Week

Netmaker versions prior to 1.5.0 fail to properly validate host JWT tokens during authorization, allowing any attacker with knowledge of target object identifiers to bypass access controls and read, modify, or delete resources across different hosts. The vulnerability affects critical operations including node management, host deletion, and failover configurations, requiring only a valid host token and network access to exploit. Update to version 1.5.0 or later to remediate.

Wireguard Netmaker
NVD GitHub
CVE-2026-27899
EPSS 0% CVSS 8.8
HIGH PATCH This Week

Privilege escalation in WireGuard Portal prior to version 2.1.3 allows authenticated non-admin users to gain full administrator access by modifying their own user profile with an IsAdmin flag set to true. The vulnerability exists because the server fails to properly validate and restrict the IsAdmin field during profile updates, allowing the privilege change to persist after re-authentication. Affected deployments require immediate patching to version 2.1.3 or later to prevent unauthorized administrative access.

Docker Wireguard Wireguard Portal +1
NVD GitHub
CVE-2026-26963
EPSS 0% CVSS 6.1
MEDIUM PATCH This Month

Cilium versions 1.18.0-1.18.5 with Native Routing, WireGuard, and Node Encryption enabled incorrectly allow cross-node Pod traffic that should be blocked, enabling unauthorized network access between isolated workloads. An attacker with network access to pods on different nodes can bypass network segmentation policies to access restricted services. The vulnerability affects deployments using these specific Cilium configurations and is resolved in version 1.18.6.

Wireguard Cilium Redhat +1
NVD GitHub
CVE-2026-25791
EPSS 0% CVSS 7.5
HIGH POC PATCH This Week

Memory exhaustion in Sliver C2 framework prior to version 1.7.0 allows unauthenticated remote attackers to bypass OTP validation in the DNS listener and create unbounded server-side sessions without expiry mechanisms. Public exploit code exists for this vulnerability, enabling attackers to repeatedly allocate sessions and exhaust server memory resources. The DNS C2 listener accepts bootstrap messages without proper authentication even when OTP enforcement is enabled.

Dns Wireguard Sliver +1
NVD GitHub
CVE-2026-25760
EPSS 0% CVSS 6.5
MEDIUM POC PATCH This Month

Authenticated operators in Sliver C2 framework versions prior to 1.6.11 can read arbitrary files on the server through a path traversal vulnerability in the website content subsystem, potentially exposing sensitive credentials, configurations, and cryptographic keys. Public exploit code exists for this vulnerability. The issue is resolved in version 1.6.11 and later.

Wireguard Path Traversal Sliver +1
NVD GitHub
CVE-2022-50917
EPSS 0% CVSS 7.8
HIGH POC This Week

Protonvpn versions up to 1.26.0 contains a vulnerability that allows attackers to potentially execute arbitrary code (CVSS 7.8).

Wireguard Protonvpn
NVD Exploit-DB

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy