PT-2026-30676 · Unknown+2 · Postgresql+3
Khaelk138
·
Published
2026-04-06
·
Updated
2026-04-06
·
CVE-2026-34977
CVSS v4.0
9.3
Critical
| AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L |
Name of the Vulnerable Software and Affected Versions
Aperi'Solve versions prior to 3.2.1
Description
Aperi'Solve is a steganalysis web platform. Before version 3.2.1, a password provided when uploading a JPEG is passed directly into an expect command and then a bash -c command without sanitization. This allows an unauthenticated attacker to achieve root-level remote code execution (RCE) within the worker container, granting full read/write access to user-uploaded images, analysis results, and steganography passwords. The container shares a Docker network with PostgreSQL and Redis, allowing the attacker to potentially dump the database or manipulate the job queue. Docker socket mounting or host volume mounts could lead to full host compromise, including website defacement.
Recommendations
Update to version 3.2.1 or later.
Fix
RCE
OS Command Injection
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Aperisolve
Docker
Postgresql
Redis