Skip to content

x/vulndb: potential Go vuln in github.com/bishopfox/sliver: GHSA-q8j9-34qf-7vq7 #4079

@GoVulnBot

Description

@GoVulnBot

Advisory GHSA-q8j9-34qf-7vq7 references a vulnerability in the following Go modules:

Module
github.com/bishopfox/sliver

Description:

Summary

Sliver's custom Wireguard netstack doesn't limit traffic between Wireguard clients, this could lead to:

  1. Leaked/recovered keypair (from a beacon) being used to attack operators.
  2. Port forwardings usable from other implants.

Details

  1. Sliver treat operators' Wireguard config and beacon/session's Wireguard config equally, they both connect to the wireguard listener created from the CLI.

  2. The current netstack implementation does not filter traffic between clients.
    I think this piece of code handle traffic between clients, from experimental results clients can ping and c...

References:

Cross references:

See doc/quickstart.md for instructions on how to triage this report.

id: GO-ID-PENDING
modules:
    - module: github.com/bishopfox/sliver
      vulnerable_at: 1.5.43
summary: Silver has unrestricted traffic between Wireguard clients in github.com/bishopfox/sliver
cves:
    - CVE-2025-27093
ghsas:
    - GHSA-q8j9-34qf-7vq7
references:
    - advisory: https://github.com/BishopFox/sliver/security/advisories/GHSA-q8j9-34qf-7vq7
    - advisory: https://github.com/advisories/GHSA-q8j9-34qf-7vq7
    - fix: https://github.com/BishopFox/sliver/commit/8e5c5f14506d6d60ebb3362e6b9857ab1e0d76ff
source:
    id: GHSA-q8j9-34qf-7vq7
    created: 2025-10-28T18:01:12.899194771Z
review_status: UNREVIEWED

Metadata

Metadata

Assignees

Labels

Type

No type

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions