CVE-2026-27626: OliveTin: OS Command Injection via `password` argument type and webhook JSON extraction bypasses shell safety checks
(updated )
OliveTin’s shell mode safety check (checkShellArgumentSafety) blocks several dangerous argument types but not password. A user supplying a password-typed argument can inject shell metacharacters that execute arbitrary OS commands. A second independent vector allows unauthenticated RCE via webhook-extracted JSON values that skip type safety checks entirely before reaching sh -c.
References
Code Behaviors & Features
Detect and mitigate CVE-2026-27626 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →