Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
7.5

Libssh SFTP Extension May Allow Remote Code Execution

DEBIAN-CVE-2026-3731
Summary

Libssh's SFTP extension has a weakness that can allow an attacker to access unauthorized data. This means an attacker may be able to access sensitive information or even take control of your system. To fix this, update to version 0.11.4 or 0.12.0 of libssh.

What to do

No fix is available yet. Check with your software vendor for updates.

Affected software
VendorProductAffected versionsFix available
debian libssh All versions
debian libssh All versions
debian libssh All versions
debian libssh All versions
Original title
A weakness has been identified in libssh up to 0.11.3. The impacted element is the function sftp_extensions_get_name/sftp_extensions_get_data of the file src/sftp.c of the component SFTP Extension ...
Original description
A weakness has been identified in libssh up to 0.11.3. The impacted element is the function sftp_extensions_get_name/sftp_extensions_get_data of the file src/sftp.c of the component SFTP Extension Name Handler. Executing a manipulation of the argument idx can lead to out-of-bounds read. The attack may be performed from remote. Upgrading to version 0.11.4 and 0.12.0 is sufficient to resolve this issue. This patch is called 855a0853ad3abd4a6cd85ce06fce6d8d4c7a0b60. You should upgrade the affected component.
osv CVSS3.1 9.8
Published: 8 Mar 2026 · Updated: 14 Mar 2026 · First seen: 10 Mar 2026