wolfictl

Direct Vulnerabilities

Known vulnerabilities in the wolfictl package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • L
GHSA-pxq6-2prw-chj9

<0.39.6-r2
  • L
Authentication Bypass

<0.39.6-r2
  • L
Off-by-one Error

<0.39.6-r2
  • L
GHSA-x744-4wpc-v9h2

<0.39.6-r2
  • L
GHSA-rjcw-vg7j-m9rc

<0.39.6-r1
  • L
Improper Cleanup on Thrown Exception

<0.39.6-r1
  • L
Improper Authorization

<0.39.5-r2
  • L
GHSA-p77j-4mvh-x3m3

<0.39.5-r2
  • H
Directory Traversal

<0.39.0-r1
  • L
GHSA-265r-hfxg-fhmg

<0.31.1-r1
  • L
GHSA-rf4g-89h5-crcr

<0.39.0-r1
  • L
GHSA-rwvp-r38j-9rgg

<0.38.18-r2
  • L
CVE-2025-47914

<0.38.21-r3
  • M
CVE-2025-11579

<0.38.18-r2
  • L
GHSA-j5w8-q4qc-rx2x

<0.38.21-r3
  • L
GHSA-8fj7-8h3w-xwfm

<0.39.3-r1
  • L
Allocation of Resources Without Limits or Throttling

<0.29.4-r2
  • H
OS Command Injection

<0.39.0-r1
  • L
GHSA-qxx2-7h4c-83f4

<0.39.0-r1
  • H
Symlink Following

<0.38.21-r2
  • L
CVE-2026-27141

<0.39.3-r1
  • L
GHSA-3whm-j4xm-rv8x

<0.28.1-r0
  • M
Memory Leak

<0.38.21-r2
  • H
Integer Overflow or Wraparound

<0.31.1-r1
  • H
Incorrect Privilege Assignment

<0.37.1-r1
  • L
GHSA-m6hq-p25p-ffr2

<0.38.21-r2
  • H
Incorrect Execution-Assigned Permissions

<0.38.21-r2
  • L
GHSA-r9px-m959-cxf4

<0.27.5-r0
  • L
GHSA-q9hv-hpm4-hj6x

<0.39.2-r1
  • L
GHSA-x4rx-4gw3-53p4

<0.38.5-r1
  • L
GHSA-4f8r-qqr9-fq8j

<0.38.21-r0
  • L
CVE-2025-61732

<0.39.0-r2
  • L
Race Condition

<0.38.21-r0
  • C
CVE-2026-1229

<0.39.2-r1
  • L
GHSA-v778-237x-gjrc

<0.27.1-r0
  • L
GHSA-h355-32pf-p2xm

<0.39.0-r2
  • C
Trust Boundary Violation

<0.37.2-r1
  • M
Missing Initialization of Resource

<0.38.5-r1
  • L
GHSA-fv92-fjc5-jj9h

<0.37.7-r1
  • L
Improper Initialization

<0.39.1-r1
  • L
GHSA-fw7p-63qq-7hpr

<0.39.1-r1
  • L
Resource Exhaustion

<0.27.5-r0
  • L
Arbitrary Argument Injection

<0.27.5-r0
  • M
Directory Traversal

<0.39.0-r1
  • L
GHSA-cgrx-mc8f-2prm

<0.38.21-r2
  • L
GHSA-c6gw-w398-hv78

<0.29.4-r2
  • L
GHSA-pwhc-rpq9-4c8w

<0.38.21-r2
  • H
OS Command Injection

<0.39.0-r1
  • L
CVE-2024-45338

<0.27.2-r1
  • L
CVE-2025-22866

<0.28.1-r0
  • L
GHSA-37cx-329c-33x3

<0.39.0-r3
  • L
GHSA-vqqr-rmpc-hhg2

<0.39.0-r1
  • M
Improper Validation of Integrity Check Value

<0.39.0-r3
  • L
GHSA-2w4f-9fgg-q2v9

<0.39.0-r1
  • L
CVE-2024-45337

<0.27.1-r0
  • L
Race Condition

<0.38.9-r1
  • L
GHSA-55v3-xh23-96gh

<0.26.0-r1
  • L
GHSA-cxfp-7pvr-95ff

<0.37.1-r1
  • L
GHSA-j5pm-7495-qmr3

<0.38.9-r1
  • L
GHSA-8jvr-vh7g-f8gx

<0.39.0-r2
  • C
CVE-2025-68121

<0.39.0-r2
  • L
GHSA-v725-9546-7q7m

<0.27.5-r0
  • L
CVE-2025-8959

<0.38.11-r1
  • L
GHSA-w32m-9786-jp63

<0.27.2-r1
  • L
GHSA-g9f5-x53j-h563

<0.37.2-r1
  • L
GHSA-wjrx-6529-hcj3

<0.38.11-r1
  • H
CVE-2024-53859

<0.26.0-r1
  • L
CVE-2025-58181

<0.38.21-r3
  • L
GHSA-f6x5-jh6r-wrfv

<0.38.21-r3
  • L
CVE-2024-41110

<0.21.0-r1
  • L
GHSA-v23v-6jw2-98fq

<0.21.0-r1
  • L
CVE-2024-24791

<0.19.2-r1
  • L
GHSA-hw49-2p59-3mhj

<0.19.2-r1
  • H
CVE-2024-6257

<0.19.0-r1
  • L
GHSA-xfhp-jf8p-mh5w

<0.19.0-r1
  • M
CVE-2024-24789

<0.16.15-r1
  • L
GHSA-2cgq-h8xw-2v5j

<0.16.6-r1
  • L
GHSA-236w-p7wf-5ph8

<0.16.15-r1
  • L
GHSA-49gw-vxvf-fc2g

<0.16.15-r1
  • C
CVE-2024-24790

<0.16.15-r1
  • L
Arbitrary Command Injection

<0.16.6-r1
  • L
GHSA-rhh4-rh7c-7r5v

<0.16.6-r1
  • H
Directory Traversal

<0.16.6-r1
  • L
GHSA-c5pj-mqfh-rvc3

<0.16.6-r1
  • L
GHSA-x84c-p2g9-rqv9

<0.15.19-r1
  • M
CVE-2024-32473

<0.15.19-r1
  • H
Allocation of Resources Without Limits or Throttling

<0.15.18-r1
  • L
GHSA-88jx-383q-w4qc

<0.15.18-r1
  • M
Allocation of Resources Without Limits or Throttling

<0.15.18-r1
  • L
GHSA-95pr-fxf5-86gv

<0.15.18-r1
  • H
Incorrect Resource Transfer Between Spheres

<0.15.7-r1
  • L
GHSA-mq39-4gv4-mvpx

<0.15.7-r1
  • L
CVE-2024-28180

<0.15.3-r3
  • L
GHSA-c5q2-7r4c-mv6g

<0.15.3-r3
  • H
Exposure of Resource to Wrong Sphere

<0.14.13-r0
  • L
GHSA-xr7r-f8xq-vfvv

<0.14.13-r0
  • L
GHSA-hpxr-w9w7-g4gv

<0.14.13-r0
  • C
Directory Traversal

<0.14.13-r0
  • L
GHSA-9763-4f94-gfch

<0.14.1-r0