utcp-cli Vulnerable to Command Injection via Unsanitized Argument Substitution in CLI Communication Protocol — CVE-2026-45369
GHSA · GitHub · CVE-2026-45369
ID
CVE-2026-45369
CVE-2026-45369
Date
Activity
Source
GHSA
GHSA
Vendor
GitHub
GitHub
Threat
critical
critical
CVSS
10
10
Summary
## Summary The `_substitute_utcp_args` method in `cli_communication_protocol.py` inserts user-controlled `tool_args` values directly into shell command strings without any sanitization or escaping. These commands are then executed via `/bin/bash -c` (Unix) or `powershell.exe -Command` (Windows), allowing an attacker to inject arbitrary shell commands. ## Affected File…
Product
pip: utcp-cli
What to do
General, cautious steps (verify details in the official source):
- Prioritize patching or mitigation immediately (treat as actively risky).
- Identify affected product versions in your inventory and verify whether you are impacted.
- Apply vendor patches/updates or recommended mitigations as soon as available.
- Read the official advisory for exact affected versions and remediation steps.