Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 15 Apr 2026 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | InfCode Terminal Auto‑Execution Vulnerability Allowing Arbitrary PowerShell Command Execution |
Tue, 14 Apr 2026 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:tokfinity:infcode:*:*:*:*:*:*:*:* |
Fri, 03 Apr 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tokfinity
Tokfinity infcode |
|
| Vendors & Products |
Tokfinity
Tokfinity infcode |
Wed, 01 Apr 2026 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | InfCode Terminal Auto‑Execution Vulnerability Allowing Arbitrary PowerShell Command Execution |
Tue, 31 Mar 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-78 | |
| Metrics |
cvssV3_1
|
Tue, 31 Mar 2026 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | InfCode's terminal auto-execution module contains a critical command filtering vulnerability that renders its blacklist security mechanism completely ineffective. The predefined blocklist fails to cover native high-risk commands in Windows PowerShell (such as powershell), and the matching algorithm lacks dynamic semantic parsing unable to recognize string concatenation, variable assignment, or double-quote interpolation in Shell syntax. Malicious commands can bypass interception through simple syntax obfuscation. An attacker can construct a file containing malicious instructions for remote code injection. When a user imports and views such a file in the IDE, the Agent executes dangerous PowerShell commands outside the blacklist without user confirmation, resulting in arbitrary command execution or sensitive data leakage. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-03-31T15:15:28.893Z
Reserved: 2026-03-04T00:00:00.000Z
Link: CVE-2026-30309
Updated: 2026-03-31T15:11:13.504Z
Status : Analyzed
Published: 2026-03-31T15:16:12.863
Modified: 2026-04-14T15:49:43.420
Link: CVE-2026-30309
No data.
OpenCVE Enrichment
Updated: 2026-04-15T16:45:09Z