Back to list

Dalfox Server Mode Vulnerable to Unauthenticated Remote Code Execution via `found-action` — CVE-2026-45087

GitHub · GitHub · CVE-2026-45087

ID
CVE-2026-45087
Date
Activity
Source
GitHub
Vendor
GitHub
Threat
critical
CVSS
10

Summary

# GHSA: Unauthenticated Remote Code Execution via `found-action` in Dalfox Server Mode ## Summary When dalfox is started in REST API server mode (`dalfox server`), the server binds to `0.0.0.0:6664` by default and requires no API key unless the operator explicitly passes `--api-key`. Because `model.Options` — including `FoundAction` and `FoundActionShell` — is deserialized directly from attacker-supplied JSON in…

Product

go: github.com/hahwul/dalfox/v2

What to do

General, cautious steps (verify details in the official source):

  • Prioritize patching or mitigation immediately (treat as actively risky).
  • Identify affected product versions in your inventory and verify whether you are impacted.
  • Apply vendor patches/updates or recommended mitigations as soon as available.
  • Read the official advisory for exact affected versions and remediation steps.

Official advisory

Related advisories