We found results for “”
CVE-2026-25593
Good to know:
Date: February 5, 2026
Summary An unauthenticated local client could use the Gateway WebSocket API to write config via "config.apply" and set unsafe "cliPath" values that were later used for command discovery, enabling command injection as the gateway user. Impact A local process on the same machine could execute arbitrary commands as the gateway process user. Details - "config.apply" accepted raw JSON and wrote it to disk after schema validation. - "cliPath" values were not constrained to safe executable names/paths. - Command discovery used a shell invocation when resolving executables. Mitigation Upgrade to a patched release. If projects cannot upgrade immediately, set "gateway.auth" and avoid custom "cliPath" values.
Severity Score
Severity Score
Weakness Type (CWE)
Top Fix
CVSS v3.1
| Base Score: |
|
|---|---|
| Attack Vector (AV): | LOCAL |
| Attack Complexity (AC): | LOW |
| Privileges Required (PR): | NONE |
| User Interaction (UI): | NONE |
| Scope (S): | UNCHANGED |
| Confidentiality (C): | HIGH |
| Integrity (I): | HIGH |
| Availability (A): | HIGH |
Vulnerabilities
Projects
Contact Us


