PT-2026-21844 · Olivetin · Olivetin

Byamb4

·

Published

2026-02-25

·

Updated

2026-03-03

·

CVE-2026-27626

CVSS v3.1

9.9

Critical

AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Name of the Vulnerable Software and Affected Versions OliveTin versions up to and including 3000.10.0
Description OliveTin, a tool designed to simplify shell command execution, has flaws in its shell command execution mechanism. The checkShellArgumentSafety function does not block the password argument type, allowing injection of shell metacharacters and arbitrary OS command execution. Additionally, webhook-extracted JSON values bypass type safety checks entirely before being passed to sh -c, leading to unauthenticated remote code execution (RCE) if the instance receives webhooks from external sources. Exploiting both vectors results in unauthenticated RCE on any OliveTin instance using Shell mode with webhook-triggered actions. The vulnerability stems from inadequate input validation and safety checks within the application. The vulnerable function is checkShellArgumentSafety. The vulnerable parameters are the password argument and webhook-extracted JSON values.
Recommendations Versions prior to 3000.10.0 are affected. At the moment, there is no information about a newer version that contains a fix for this vulnerability.

Exploit

RCE

OS Command Injection

Weakness Enumeration

Related Identifiers

CVE-2026-27626
GHSA-49GM-HH7W-WFVF
GO-2026-4547
SUSE-SU-2026:0757-1

Affected Products

Olivetin