Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-33p6-5jxp-p3x4 | utcp-cli Vulnerable to Command Injection via Unsanitized Argument Substitution in CLI Communication Protocol |
Sat, 16 May 2026 01:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 14 May 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | python-utcp is the python implementation of UTCP. Prior to 1.1.3, the _substitute_utcp_args method in cli_communication_protocol.py inserts user-controlled tool_args values directly into shell command strings without any sanitization or escaping. These commands are then executed via /bin/bash -c (Unix) or powershell.exe -Command (Windows), allowing an attacker to inject arbitrary shell commands. This vulnerability is fixed in 1.1.3. | |
| Title | python-utcp: Command Injection via Unsanitized Argument Substitution in CLI Communication Protocol | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV3_1
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-16T01:00:25.585Z
Reserved: 2026-05-12T00:51:29.085Z
Link: CVE-2026-45369
Updated: 2026-05-16T01:00:20.385Z
Status : Deferred
Published: 2026-05-14T21:16:48.220
Modified: 2026-05-16T01:16:17.233
Link: CVE-2026-45369
No data.
OpenCVE Enrichment
Updated: 2026-05-14T22:00:10Z
Github GHSA