WhisperX tag archive

#CWE-78

This page collects WhisperX intelligence signals tagged #CWE-78. It is designed for humans, search engines, and AI agents: each item links to a canonical source-backed record with sector, source, timestamp, credibility, and exportable structured data.

Latest Signals (19)

The Lab · 2026-04-09 06:27:11 · GitHub Issues

1. PraisonAI Codebase Exposes 29 Shell Injection Vulnerabilities (CWE-78) Post-Audit

A critical security audit of the PraisonAI codebase has revealed 29 unaddressed shell injection vulnerabilities, classified as CWE-78, posing a direct risk of arbitrary command execution. These high-risk flaws persist despite a recent security push that successfully patched other issues, indicating a deliberate deferra...

The Lab · 2026-04-13 03:22:25 · GitHub Issues

2. HIGH-Severity Shell Injection Flaw Found in Unit Test Fixture (B602 / CWE-78)

A high-severity security vulnerability has been flagged in a project's test suite, exposing a potential shell injection risk. The automated security scanner Bandit identified a `subprocess.Popen` call configured with `shell=True` in the file `tests/unit_tests/fixtures/bash_mock.py` at line 27. This pattern, classified ...

The Lab · 2026-04-13 03:22:37 · GitHub Issues

3. HIGH-Severity Shell Injection Risk Found in Cypress Script (B602 / CWE-78)

A high-severity security vulnerability has been flagged in a key automation script, exposing the codebase to potential shell injection attacks. The automated scanner `bandit` identified the use of `subprocess.Popen` with `shell=True` in the file `scripts/cypress_run.py` at line 83. This coding pattern, classified under...

The Lab · 2026-04-13 03:22:38 · GitHub Issues

4. HIGH-Severity Shell Injection Flaw Found in GitHub Project's 'check-env.py' Script

A high-severity security vulnerability has been flagged in a GitHub project's environment-checking script. The automated security scanner Bandit identified a `subprocess.Popen` call with `shell=True` in the file `scripts/check-env.py` at line 50. This coding pattern, classified under CWE-78 (Improper Neutralization of ...

The Lab · 2026-04-13 03:22:40 · GitHub Issues

5. HIGH-Severity Shell Injection Vulnerability Found in RELEASING/changelog.py (B605)

A high-severity security vulnerability has been flagged in the project's release automation code. The automated security scanner `bandit` identified a `B605` rule violation—'Start Process With A Shell'—on line 281 of the `RELEASING/changelog.py` file. This class of vulnerability, categorized under CWE-78 (Improper Neut...

The Lab · 2026-04-13 06:22:30 · GitHub Issues

6. GitHub Repo 'vuln-test-suite' Exposes Critical Command Injection Flaw via `shell=True`

A critical security vulnerability has been flagged in a public GitHub repository, exposing a direct path for command injection attacks. The automated scanner 'bandit' identified a HIGH severity flaw (CWE-78) in the file `vulnerable_code/command_injection.py`. The issue stems from the dangerous use of `subprocess.call()...

The Lab · 2026-04-14 04:22:27 · GitHub Issues

7. HIGH-Severity Shell Injection Vulnerability Flagged in Unit Test Fixture (B602/CWE-78)

A high-severity security vulnerability has been flagged within a project's test suite, exposing a potential command injection vector. The automated security scanner Bandit identified a `subprocess.Popen` call configured with `shell=True` in the file `tests/unit_tests/fixtures/bash_mock.py` at line 27. This pattern, cla...

The Lab · 2026-04-14 04:22:39 · GitHub Issues

8. HIGH-Severity Shell Injection Vulnerability Found in Cypress Script (B602)

A high-severity security vulnerability has been flagged in a key automation script, exposing a potential command injection attack vector. The automated security scanner Bandit identified the issue as rule B602 (CWE-78) within the file `scripts/cypress_run.py` at line 83. The core of the vulnerability is the use of `sub...

The Lab · 2026-04-14 05:22:32 · GitHub Issues

9. HIGH-Severity Shell Injection Vulnerability in RELEASING/changelog.py (B605)

A high-severity security vulnerability has been flagged in the project's release automation code. The automated security scanner Bandit identified a 'Start Process With A Shell' flaw (Rule B605) on line 281 of the `RELEASING/changelog.py` file. This class of vulnerability, categorized under CWE-78, indicates a potentia...

The Lab · 2026-04-14 08:22:38 · GitHub Issues

10. HIGH-Severity Shell Injection Risk in Cypress Script (B602) - Subprocess Popen with shell=True

A high-severity security vulnerability has been flagged in a key automation script, exposing the codebase to potential shell injection attacks. The scanner identified a `subprocess.Popen` call configured with `shell=True` in the file `scripts/cypress_run.py` at line 83. This configuration is a known security anti-patte...

The Lab · 2026-04-15 06:22:33 · GitHub Issues

11. Apache Superset Codebase Exposes Critical Command Injection Vulnerability in 'command_injection.py'

A critical security flaw has been flagged in the Apache Superset codebase, exposing a potential command injection vulnerability. The automated security scanner 'bandit' identified a HIGH severity issue (CWE-78) in a file named `command_injection.py`. The vulnerability stems from the unsafe use of `os.system()` with uns...

The Lab · 2026-04-15 06:22:34 · GitHub Issues

12. Apache Superset Codebase Exposes High-Severity Command Injection Vulnerability in command_injection.py

A high-severity security flaw has been flagged within the Apache Superset project's codebase, exposing a potential command injection vulnerability. The automated security scanner Bandit identified a critical issue in the file `command_injection.py` at line 22, where a `subprocess.call()` function is executed with `shel...

The Lab · 2026-04-15 06:22:35 · GitHub Issues

13. Apache Superset Codebase Exposes Critical Command Injection Vulnerability via 'shell=True'

A high-severity security flaw has been flagged within the Apache Superset codebase, exposing a potential command injection vulnerability. The automated security scanner 'bandit' identified a critical instance where the Python subprocess module is invoked with the dangerous `shell=True` parameter. This configuration all...

The Lab · 2026-04-21 18:23:00 · GitHub Issues

14. Critical OS Command Injection in `app.py` Search Function Exposes System to Remote Attack

A critical security vulnerability in a Python application's `app.py` file allows remote attackers to execute arbitrary system commands on the host server. The flaw, classified as OS Command Injection (CWE-78), is located in the `search` function at line 120, where unsanitized user input is directly interpolated into a ...

The Lab · 2026-04-22 11:27:32 · GitHub Issues

15. Critical Shell Injection Regression in deleteViaEphemeral Exposes Staging to Path Traversal

A critical security regression has been identified in the staging environment at commit 36240c75, involving the deleteViaEphemeral function. The vulnerability, catalogued as F1502 under CWE-78 (OS Command Injection), stems from shell string concatenation in the deletion logic. The affected code constructs the command a...

The Lab · 2026-04-22 22:54:19 · GitHub Issues

16. F1085: Critical OS Command Injection Vulnerability in workspace-server Enables Volume Escape via Path Traversal

A serious OS command injection flaw has been identified and patched in workspace-server, potentially allowing malicious actors to delete files outside the intended `/configs` volume directory. The vulnerability, designated F1085 and classified as CWE-78, stems from how the `deleteViaEphemeral` function constructs shell...

The Lab · 2026-04-22 23:54:11 · GitHub Issues

17. Critical Volume Deletion Flaw Found in deleteViaEphemeral: Entire /configs Mount Wiped Regardless of FilePath

A critical scope vulnerability has been identified in the `deleteViaEphemeral` utility function, classified under F1085 and mapped to CWE-78 and CWE-22. The flaw causes the function to delete the entire `/configs` volume mount rather than scoped individual files, representing a severe data destruction risk for any syst...

The Lab · 2026-05-09 04:01:41 · Mastodon:mastodon.social:#infosec

18. Critical CVE-2026-42454: Termix-SSH Command Injection Flaw Exposes Managed Servers to Remote Code Execution

A critical security vulnerability tracked as CVE-2026-42454 has been disclosed in Termix-SSH, affecting all versions prior to 2.1.0. The flaw enables authenticated users to execute arbitrary operating system commands through the containerId parameter, creating a direct pathway to remote code execution on managed server...

The Lab · 2026-05-11 17:38:27 · Mastodon:mastodon.social:#infosec

19. CVE-2026-7816: High-Severity OS Command Injection Flaw Found in pgAdmin 4 Import/Export Module

A critical OS command injection vulnerability has been identified in pgAdmin 4, the widely-used open-source administration platform for PostgreSQL databases. Tracked as CVE-2026-7816 and assigned a CVSS score of 8.8 (High), the flaw resides in the Import/Export query export functionality, where user-supplied input is c...