Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 01 May 2026 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Zenc-lang
Zenc-lang zen C |
|
| CPEs | cpe:2.3:a:zenc-lang:zen_c:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Z-libs zen C
|
Zenc-lang
Zenc-lang zen C |
Tue, 03 Mar 2026 01:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Z-libs zen C
|
|
| CPEs | cpe:2.3:a:z-libs:zen_c:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Z-libs zen C
|
Mon, 02 Mar 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 27 Feb 2026 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Fri, 27 Feb 2026 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Z-libs
Z-libs zen-c |
|
| Vendors & Products |
Z-libs
Z-libs zen-c |
Thu, 26 Feb 2026 22:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Zen C is a systems programming language that compiles to human-readable GNU C/C11. Prior to version 0.4.2, a command injection vulnerability (CWE-78) in the Zen C compiler allows local attackers to execute arbitrary shell commands by providing a specially crafted output filename via the `-o` command-line argument. The vulnerability existed in the `main` application logic (specifically in `src/main.c`), where the compiler constructed a shell command string to invoke the backend C compiler. This command string was built by concatenating various arguments, including the user-controlled output filename, and was subsequently executed using the `system()` function. Because `system()` invokes a shell to parse and execute the command, shell metacharacters within the output filename were interpreted by the shell, leading to arbitrary command execution. An attacker who can influence the command-line arguments passed to the `zc` compiler (like through a build script or a CI/CD pipeline configuration) can execute arbitrary commands with the privileges of the user running the compiler. The vulnerability has been fixed in version 0.4.2 by removing `system()` calls, implementing `ArgList`, and internal argument handling. Users are advised to update to Zen C version v0.4.2 or later. | |
| Title | Zen-C Vulnerable to Command Injection via Malicious Output Filename | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-02T20:48:09.055Z
Reserved: 2026-02-25T15:28:40.648Z
Link: CVE-2026-28207
Updated: 2026-02-27T16:57:44.054Z
Status : Analyzed
Published: 2026-02-26T23:16:35.277
Modified: 2026-05-01T14:38:16.460
Link: CVE-2026-28207
No data.
OpenCVE Enrichment
Updated: 2026-04-17T14:15:21Z