Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 10 Feb 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Karutoil
Karutoil catalyst |
|
| Vendors & Products |
Karutoil
Karutoil catalyst |
Tue, 10 Feb 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Catalyst is a platform built for enterprise game server hosts, game communities, and billing panel integrations. Install scripts defined in server templates execute directly on the host operating system as root via bash -c, with no sandboxing or containerization. Any user with template.create or template.update permission can define arbitrary shell commands that achieve full root-level remote code execution on every node machine in the cluster. This vulnerability is fixed in commit 11980aaf3f46315b02777f325ba02c56b110165d. | |
| Title | Catalyst Affected by Remote Code Execution as Root via Containerized Install Script Execution | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-10T19:10:21.719Z
Reserved: 2026-02-09T21:36:29.553Z
Link: CVE-2026-26009
Updated: 2026-02-10T19:10:18.352Z
Status : Deferred
Published: 2026-02-10T19:16:04.437
Modified: 2026-04-15T00:35:42.020
Link: CVE-2026-26009
No data.
OpenCVE Enrichment
Updated: 2026-04-17T20:30:15Z