WhisperX tag archive

#Command Injection

This page collects WhisperX intelligence signals tagged #Command Injection. It is designed for humans, search engines, and AI agents: each item links to a canonical source-backed record with sector, source, timestamp, credibility, and exportable structured data.

Latest Signals (20)

The Lab · 2026-03-25 08:27:20 · GitHub Issues

1. GitHub Repository Exposes High-Risk Command Injection in PR_NUMBER Script

A critical command injection vulnerability has been exposed in a GitHub repository's automation script, allowing potential remote code execution. The flaw resides in `scripts/post_review_checklist.sh`, where the `PR_NUMBER` parameter is used directly in shell commands without validation. An attacker who can control thi...

The Lab · 2026-03-26 10:27:05 · GitHub Issues

2. GitHub Security Alert: Command-Line Injection Vulnerability in main.py Paddle Speed Input

A critical security flaw has been identified in a Python script's command-line input handling, exposing a direct path for argument injection and potential denial-of-service attacks. The vulnerability resides in the `main.py` file, which accepts a paddle speed parameter from the command line. The current defense—a regul...

The Lab · 2026-03-26 22:27:20 · GitHub Issues

3. GCP Cloud Driver Exposes HIGH-Severity Command Injection Risk in Critical Function

A high-severity command injection vulnerability has been identified within a core Google Cloud Platform (GCP) driver script. The flaw resides in the `_gcp_exec_long` function in the file `sh/e2e/lib/clouds/gcp.sh`, where a critical oversight in command construction could allow an attacker to execute arbitrary shell com...

The Lab · 2026-03-27 13:27:18 · GitHub Issues

4. Aikido Patches Critical Windows Command Injection in systeminformation Library (CVE-2025-68154)

A critical security vulnerability in the popular `systeminformation` library exposes Windows systems to arbitrary code execution. The flaw, tracked as CVE-2025-68154 and rated HIGH severity, resides in the `fsSize()` function. It allows for OS command injection by passing unsanitized user input via the `drive` paramete...

The Lab · 2026-03-28 02:27:07 · GitHub Issues

5. CVE-2026-33941: High-Severity Command Injection Flaw in Handlebars CLI Precompiler

A high-severity command injection vulnerability has been identified in the Handlebars CLI precompiler, tracked as CVE-2026-33941. The flaw resides in the `bin/handlebars` and `lib/precompiler.js` components of the popular templating library. The core issue is that the precompiler concatenates user-controlled strings—sp...

The Lab · 2026-03-28 06:26:59 · GitHub Issues

6. GitHub Provision Script Flaw: Unsafe Base64 Variable Expansion Opens Door to Potential Command Injection

A security vulnerability has been identified in a GitHub repository's provisioning script, where an unsafe variable expansion could allow for command injection under specific, corrupted conditions. The flaw is located in the `sh/e2e/lib/provision.sh` script at line 176. During the creation of a manual `.spawnrc` fallba...

The Lab · 2026-03-28 06:27:00 · GitHub Issues

7. DigitalOcean E2E Script Exposes SSH Command Injection Risk via Unsafe Variable Expansion

A critical security flaw has been identified in a DigitalOcean integration script, where unsafe variable interpolation creates a potential command injection vector in remote SSH commands. The vulnerability, located in the `_digitalocean_exec_long` function within the `sh/e2e/lib/clouds/digitalocean.sh` file, allows a b...

The Lab · 2026-03-28 06:27:01 · GitHub Issues

8. GitHub Security: Command Injection Vulnerability in provision.sh via cloud_headless_env Export Parsing

A critical command injection vulnerability has been identified in a GitHub repository's provisioning script, exposing systems to potential remote code execution. The flaw resides in the `sh/e2e/lib/provision.sh` file, specifically in lines 60-62, where environment variable export parsing logic fails to sanitize capture...

The Lab · 2026-03-29 08:26:58 · GitHub Issues

9. GitHub Workflow Vulnerability: Command Injection in Claude Agentic Pipeline Example via github.event.label.name

A high-risk command injection vulnerability exists in a public GitHub Actions workflow example, exposing repositories to potential remote code execution. The flaw resides in the `examples/claude-agentic-pipeline.yml` file, where user-controlled input from `github.event.label.name` is directly used in shell variable exp...

The Lab · 2026-03-30 20:27:31 · GitHub Issues

10. KubePlus 4.1.4 SSRF 취약점: 차트 URL 검증 누락으로 인한 서버 측 요청 위조 및 명령어 삽입 위험

Kubernetes 확장 플랫폼 KubePlus의 4.1.4 버전에 심각한 서버 측 요청 위조(SSRF) 취약점이 존재한다. 이 취약점(CVE-2026-29954)은 CVSS 7.6의 높은 위험도로 평가되며, 공격자가 내부 네트워크를 탐색하거나 임의의 HTTP 헤더를 주입하고 명령어를 실행할 수 있는 경로를 열어준다. 취약점의 핵심은 ResourceComposition 리소스의 'chartURL' 필드를 처리하는 mutating webhook 및 kubeconfiggenerator 컴포넌트가 URL 인코딩만 수행하고 대상 주소를 검증하지 않아 발생하는 SSRF에 있다...

The Lab · 2026-04-01 11:27:15 · GitHub Issues

11. Vulnerability in `sbomqs` Command Execution: Missing `--` Separator Allows Option Injection via Filename

A critical vulnerability has been identified in the `sbomqs` command execution within the software supply chain security tooling. The flaw stems from a missing `--` separator and an unsafe argument order, which allows a maliciously named file to be interpreted as a command-line option. Specifically, the vulnerable code...

The Lab · 2026-04-02 14:27:28 · GitHub Issues

12. AI Flags Command Injection Risk in PHP Code — Semgrep Missed It

An AI-powered security scan has flagged a potentially dangerous command injection vulnerability in a PHP codebase, a finding that was notably missed by the conventional Semgrep static analysis tool. The issue centers on line 17 of the file `example-codes/index6.php`, where the code `echo $code;` directly outputs the co...

The Lab · 2026-04-02 15:27:18 · GitHub Issues

13. Critical Command Injection in Admin Logs Endpoint Exposes Server to Arbitrary Shell Execution

A critical security vulnerability has been patched in a web application's administrative interface, where a command injection flaw allowed attackers to execute arbitrary shell commands on the underlying server. The exposure stemmed from the `/api/admin/logs` endpoint, which used the `exec()` function to read log files ...

The Lab · 2026-04-04 14:27:02 · GitHub Issues

14. GitHub Node.js Shell.exec() 安全警告:文档更新揭示命令注入固有漏洞

Node.js 核心 `child_process` 模块中的 `shell.exec()` 函数被官方文档正式标记为存在固有安全风险。此次更新并非代码逻辑的修改,而是对一项长期存在的、可导致命令注入攻击的严重漏洞进行公开警示。文档明确指出,该函数的设计使其本质上容易受到攻击,并直接链接至更详细的安全通告。这一行动将此前分散在多个 GitHub Issue(包括 #103, #143, #495, #765, #766, #810, #842, #938, #945)中的社区担忧和报告,整合为官方的、明确的警告。 此次文档变更的核心是 `shell.exec()` 方法。该函数允许 Node.js 应用程序执行系统 shell 命...

The Lab · 2026-04-06 16:27:25 · GitHub Issues

15. Wanaku ExecClient Exposes Critical Command Injection Flaw in Tool Service

A critical command injection vulnerability has been identified within the Wanaku AI platform's ExecClient component, allowing attackers to execute arbitrary system commands. The flaw resides in how the service processes tool invocation requests, treating user-supplied URIs as direct file paths and executing them withou...

The Lab · 2026-04-09 06:27:15 · GitHub Issues

16. CRITICAL: Command Injection Vulnerability in setup.sh via eval() Exposes Systems to Full Compromise

A critical command injection vulnerability has been identified in the `setup.sh` installation script, allowing for remote code execution (RCE) and full system compromise. The flaw is rooted in line 127, where user-supplied values are passed directly to the `eval()` function without sanitization. This design flaw enable...

The Lab · 2026-04-13 06:22:30 · GitHub Issues

17. GitHub Repo 'vuln-test-suite' Exposes Critical Command Injection Flaw via `shell=True`

A critical security vulnerability has been flagged in a public GitHub repository, exposing a direct path for command injection attacks. The automated scanner 'bandit' identified a HIGH severity flaw (CWE-78) in the file `vulnerable_code/command_injection.py`. The issue stems from the dangerous use of `subprocess.call()...

The Lab · 2026-04-17 21:22:54 · GitHub Issues

18. Security Vulnerability: Unrestricted Paddle Speed Input in main.py Exposes Game to DoS, Command Injection

A critical security flaw in a game's main.py file allows attackers to inject malicious command-line arguments or crash the system through a denial-of-service (DoS) attack. The vulnerability stems from inadequate input validation for the paddle speed parameter, which is only checked to ensure it is a positive integer. T...

The Lab · 2026-04-30 21:54:08 · GitHub Issues

19. Critical AI Agent Flaw Grants Authenticated Users Arbitrary System Command Execution

A critical vulnerability in an AI agent system allows authenticated users to execute arbitrary system commands by manipulating the agent's tool execution capabilities. The flaw, discovered by researcher Casco, exploits the agent's `Bash` tool functionality, enabling attackers with valid credentials to bypass intended r...

The Lab · 2026-05-01 21:24:06 · VentureBeat

20. 200,000 MCP Servers Found Exposed With Unpatched Command Execution Flaw

Security researchers have identified a fundamental architectural vulnerability in the Model Context Protocol (MCP), the widely adopted open standard for AI agent-to-tool communication that has been integrated by Anthropic, OpenAI, and Google DeepMind. The flaw, discovered by four researchers at OX Security, affects the...