CVE-2026-27626: OliveTin
CVE-2026-27626
OliveTin gives access to predefined shell commands from a web interface. In versions up to and including 3000.10.0, OliveTin's shell mode safety check (`checkShellArgumentSafety`) blocks several dange...
Overview
A critical security vulnerability has been identified in OliveTin, a tool that provides a web interface for running predefined shell commands. This flaw allows attackers to execute arbitrary commands on the host system running OliveTin, potentially leading to full system compromise.
Vulnerability Details
The vulnerability consists of two primary attack vectors that can be combined for maximum impact.
Vector 1: Argument Type Bypass
OliveTin’s safety check for shell commands (checkShellArgumentSafety) fails to block the password argument type. An authenticated user can inject malicious shell code through this argument, bypassing intended security controls.
Vector 2: Webhook Data Processing Bypass When OliveTin processes incoming webhook data, extracted JSON values are not subjected to the same type safety checks before being passed to the shell. This allows unauthenticated remote code execution if the instance is configured to accept webhooks-a common setup.
Impact
The impact of this vulnerability is severe (CVSS: 9.9):
- Authenticated Attackers: Any user with an account (registration is enabled by default) can execute arbitrary operating system commands with the privileges of the OliveTin process.
- Unauthenticated Attackers: If the OliveTin instance receives webhooks from external sources, unauthenticated attackers can achieve the same level of access without needing credentials.
- System Compromise: Successful exploitation can lead to complete control of the host system, data theft, deployment of malware, or use as a foothold for further network attacks.
Affected Versions
All versions of OliveTin up to and including 3000.10.0 are vulnerable. At the time of publication, a patched version is not available.
Remediation and Mitigation
Given no patch is currently available, immediate mitigation is critical.
- Restrict Network Access: Immediately ensure the OliveTin web interface and webhook endpoints are not exposed to the internet or untrusted networks. Restrict access to only trusted, necessary users via network controls.
- Review Authentication: If possible, change the
authTypefromnoneand disable user registration to reduce the attack surface. Note this only mitigates Vector 1. - Disable or Isolate: Consider temporarily disabling OliveTin instances, especially those processing external webhooks, until a fix is released.
- Monitor for Updates: Closely monitor the official OliveTin project channels for the release of a security patch. Apply it immediately upon availability.
- Review Systems: Assume compromise is possible. Review affected systems for any signs of unauthorized access or anomalous activity.
Conclusion
This is a critical vulnerability that enables remote code execution. Organizations using OliveTin must implement the suggested mitigations immediately to protect their systems. The risk is particularly high for instances accessible from the internet or those configured to accept webhooks.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Am I Affected by CVE-2026-27626?
Pick an ecosystem, paste your installed version, and we'll compare it against the fixed version published on OSV.dev. Browser-only — nothing is sent to a server.
Heuristic comparison only. Always cross-check against the vendor advisory before making patching decisions.
Related Advisories
A improper neutralization of special elements used in an os command ('os command injection') vulnerability in Fortinet FortiSandbox 4.4.0 through 4.4.8 may allow attacker to execute unauthorized code ...
PraisonAI is a multi-agent teams system. In versions below 4.5.139 of PraisonAI and 1.5.140 of praisonaiagents, the workflow engine is vulnerable to arbitrary command and code execution through untrus...
aws-mcp-server Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of aws-mcp-server. Authentication i...
aws-mcp-server AWS CLI Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of aws-mcp-server. Authenti...