Back to list

utcp-cli Vulnerable to Command Injection via Unsanitized Argument Substitution in CLI Communication Protocol — CVE-2026-45369

GHSA · GitHub · CVE-2026-45369

ID
CVE-2026-45369
Date
Activity
Source
GHSA
Vendor
GitHub
Threat
critical
CVSS
10

Summary

## Summary The `_substitute_utcp_args` method in `cli_communication_protocol.py` inserts user-controlled `tool_args` values directly into shell command strings without any sanitization or escaping. These commands are then executed via `/bin/bash -c` (Unix) or `powershell.exe -Command` (Windows), allowing an attacker to inject arbitrary shell commands. ## Affected File…

Product

pip: utcp-cli

What to do

General, cautious steps (verify details in the official source):

  • Prioritize patching or mitigation immediately (treat as actively risky).
  • Identify affected product versions in your inventory and verify whether you are impacted.
  • Apply vendor patches/updates or recommended mitigations as soon as available.
  • Read the official advisory for exact affected versions and remediation steps.

Official advisory

Related advisories