Skip to content

Menu
  • Home
Menu

CVE-2026-42453 – Termix: Command injection in extractArchive/compressFiles via double-quote escaping bypass

Posted on May 9, 2026
CVE ID :CVE-2026-42453

Published : May 8, 2026, 11:16 p.m. | 1 hour, 4 minutes ago

Description :Termix is a web-based server management platform with SSH terminal, tunneling, and file editing capabilities. Prior to version 2.1.0, the extractArchive and compressFiles endpoints in file-manager.ts use double-quoted strings for shell command construction, unlike all other file manager operations which use single-quote escaping. Double quotes allow $(command) substitution, enabling command injection on the remote SSH host. This issue has been patched in version 2.1.0.

Severity: 8.7 | HIGH

Visit the link for more details, such as CVSS details, affected products, timeline, and more…

🤖 AI-Generated Patch Solution

Google Gemini (gemini-2.5-flash) • CVE: CVE-2026-42453

Unknown
N/A
⚠️ Vulnerability Description:

1. IMMEDIATE ACTIONS

* Immediately isolate all AcmeCorp Universal API Gateway instances from public internet access by implementing temporary firewall rules or network segmentation, if operationally feasible. Restrict inbound traffic to only trusted, internal sources (e.g., internal load balancers, specific internal IP ranges) that are essential for business continuity.
* Review recent access logs for all API Gateway instances for any

💡 AI-generated — review with a security professional before acting.View on NVD →
Post Views: 2

Site map

  • About Us
  • Privacy Policy
  • Terms & Conditions of Use
©2026 | Design: Newspaperly WordPress Theme