Sliver is a command and control framework that uses a custom Wireguard netstack. Prior to 1.6.11, a path traversal in the website content subsystem lets an authenticated operator read arbitrary files on the Sliver server host. This is an authenticated path traversal / arbitrary file read issue, and it can expose credentials, configs, and keys. This vulnerability is fixed in 1.6.11.
History

Fri, 06 Feb 2026 22:00:00 +0000

Type Values Removed Values Added
Description Sliver is a command and control framework that uses a custom Wireguard netstack. Prior to 1.6.11, a path traversal in the website content subsystem lets an authenticated operator read arbitrary files on the Sliver server host. This is an authenticated path traversal / arbitrary file read issue, and it can expose credentials, configs, and keys. This vulnerability is fixed in 1.6.11.
Title Website Path Traversal / Arbitrary File Read (Authenticated) in Sliver
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-02-06T21:32:27.276Z

Reserved: 2026-02-05T18:35:52.357Z

Link: CVE-2026-25760

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-02-06T22:16:12.277

Modified: 2026-02-06T22:16:12.277

Link: CVE-2026-25760

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.