PT-2026-30893 · U.S. National Security Agency · Emissary

Published

2026-04-07

·

Updated

2026-04-07

·

CVE-2026-35581

CVSS v3.1

7.2

High

AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Emissary is a P2P based data-driven workflow engine. Prior to 8.39.0, the Executrix utility class constructed shell commands by concatenating configuration-derived values — including the PLACE NAME parameter — with insufficient sanitization. Only spaces were replaced with underscores, allowing shell metacharacters (;, |, $, `, (, ), etc.) to pass through into /bin/sh -c command execution. This vulnerability is fixed in 8.39.0.

Fix

OS Command Injection

Weakness Enumeration

Related Identifiers

CVE-2026-35581

Affected Products

Emissary