Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. chromedriver
  4. ›
  5. CVE-2023-26156

CVE-2023-26156: chromedriver Command Injection vulnerability

November 9, 2023 (updated November 17, 2023)

Versions of the package chromedriver before 119.0.1 is vulnerable to Command Injection when setting the chromedriver.path to an arbitrary system binary. This could lead to unauthorized access and potentially malicious actions on the host system. Note: An attacker must have access to the system running the vulnerable chromedriver library to exploit it. The success of exploitation also depends on the permissions and privileges of the process running chromedriver.

References

  • gist.github.com/mcoimbra/47b1da554a80795c45126d51e41b2b18
  • github.com/advisories/GHSA-hm92-vgmw-qfmx
  • github.com/giggio/node-chromedriver/commit/de961e34e023afcf4fa5c0faeeec69aaa6c3c815
  • nvd.nist.gov/vuln/detail/CVE-2023-26156
  • security.snyk.io/vuln/SNYK-JS-CHROMEDRIVER-6049539

Code Behaviors & Features

Detect and mitigate CVE-2023-26156 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 119.0.1

Fixed versions

  • 119.0.1

Solution

Upgrade to version 119.0.1 or above.

Impact 7.5 HIGH

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

Source file

npm/chromedriver/CVE-2023-26156.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:56 +0000.