Advisory Database
  • Advisories
  • Dependency Scanning
  1. golang
  2. ›
  3. github.com/OliveTin/OliveTin
  4. ›
  5. CVE-2026-27626

CVE-2026-27626: OliveTin: OS Command Injection via `password` argument type and webhook JSON extraction bypasses shell safety checks

February 25, 2026 (updated February 27, 2026)

OliveTin’s shell mode safety check (checkShellArgumentSafety) blocks several dangerous argument types but not password. A user supplying a password-typed argument can inject shell metacharacters that execute arbitrary OS commands. A second independent vector allows unauthenticated RCE via webhook-extracted JSON values that skip type safety checks entirely before reaching sh -c.

References

  • github.com/OliveTin/OliveTin
  • github.com/OliveTin/OliveTin/commit/4bbd2eab153287dc744ad061c58af7693f0c3ddc
  • github.com/OliveTin/OliveTin/security/advisories/GHSA-49gm-hh7w-wfvf
  • github.com/advisories/GHSA-49gm-hh7w-wfvf
  • nvd.nist.gov/vuln/detail/CVE-2026-27626
  • pkg.go.dev/vuln/GO-2026-4547

Code Behaviors & Features

Detect and mitigate CVE-2026-27626 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 0.0.0-20260222101908-4bbd2eab1532

Fixed versions

  • 0.0.0-20260222101908-4bbd2eab1532

Solution

Upgrade to version 0.0.0-20260222101908-4bbd2eab1532 or above.

Impact 9.9 CRITICAL

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

Source file

go/github.com/OliveTin/OliveTin/CVE-2026-27626.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Mon, 16 Mar 2026 00:17:52 +0000.