Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-6c37-7w4p-jg9v | Emissary has a Command Injection via PLACE_NAME Configuration in Executrix |
Thu, 16 Apr 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Nsa
Nsa emissary |
|
| CPEs | cpe:2.3:a:nsa:emissary:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Nsa
Nsa emissary |
Wed, 08 Apr 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Nationalsecurityagency
Nationalsecurityagency emissary |
|
| Vendors & Products |
Nationalsecurityagency
Nationalsecurityagency emissary |
Wed, 08 Apr 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 07 Apr 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Emissary is a P2P based data-driven workflow engine. Prior to 8.39.0, the Executrix utility class constructed shell commands by concatenating configuration-derived values — including the PLACE_NAME parameter — with insufficient sanitization. Only spaces were replaced with underscores, allowing shell metacharacters (;, |, $, `, (, ), etc.) to pass through into /bin/sh -c command execution. This vulnerability is fixed in 8.39.0. | |
| Title | Emissary has a Command Injection via PLACE_NAME Configuration in Executrix | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-08T14:57:47.316Z
Reserved: 2026-04-03T20:09:02.827Z
Link: CVE-2026-35581
Updated: 2026-04-08T14:57:43.213Z
Status : Analyzed
Published: 2026-04-07T17:16:33.493
Modified: 2026-04-16T18:00:24.503
Link: CVE-2026-35581
No data.
OpenCVE Enrichment
Updated: 2026-04-08T19:48:08Z
Github GHSA