WhisperX tag archive

#OS Command Injection

This page collects WhisperX intelligence signals tagged #OS Command Injection. It is designed for humans, search engines, and AI agents: each item links to a canonical source-backed record with sector, source, timestamp, credibility, and exportable structured data.

Latest Signals (3)

The Lab · 2026-04-21 18:23:00 · GitHub Issues

1. Critical OS Command Injection in `app.py` Search Function Exposes System to Remote Attack

A critical security vulnerability in a Python application's `app.py` file allows remote attackers to execute arbitrary system commands on the host server. The flaw, classified as OS Command Injection (CWE-78), is located in the `search` function at line 120, where unsanitized user input is directly interpolated into a ...

The Lab · 2026-04-22 22:54:19 · GitHub Issues

2. F1085: Critical OS Command Injection Vulnerability in workspace-server Enables Volume Escape via Path Traversal

A serious OS command injection flaw has been identified and patched in workspace-server, potentially allowing malicious actors to delete files outside the intended `/configs` volume directory. The vulnerability, designated F1085 and classified as CWE-78, stems from how the `deleteViaEphemeral` function constructs shell...

The Lab · 2026-05-11 17:38:27 · Mastodon:mastodon.social:#infosec

3. CVE-2026-7816: High-Severity OS Command Injection Flaw Found in pgAdmin 4 Import/Export Module

A critical OS command injection vulnerability has been identified in pgAdmin 4, the widely-used open-source administration platform for PostgreSQL databases. Tracked as CVE-2026-7816 and assigned a CVSS score of 8.8 (High), the flaw resides in the Import/Export query export functionality, where user-supplied input is c...