DEV Community

CVE Reports
CVE Reports

Posted on • Originally published at cvereports.com

CVE-2026-45369: CVE-2026-45369: OS Command Injection in python-utcp CLI Protocol

CVE-2026-45369: OS Command Injection in python-utcp CLI Protocol

Vulnerability ID: CVE-2026-45369
CVSS Score: 10.0
Published: 2026-05-14

CVE-2026-45369 is a critical OS command injection vulnerability in the python-utcp library resulting from unsafe argument substitution in the CLI communication protocol. Unauthenticated attackers can execute arbitrary shell commands via specially crafted tool arguments.

TL;DR

A command injection flaw in python-utcp's CLI protocol allows attackers to execute arbitrary commands by supplying unescaped shell arguments during tool invocation.


⚠️ Exploit Status: POC

Technical Details

  • CWE: CWE-78: OS Command Injection
  • Attack Vector: Network
  • CVSS Score: 10.0 (Critical)
  • Impact: Remote Code Execution
  • Exploit Status: Proof of Concept Available
  • KEV Status: Not Listed

Affected Systems

  • Linux
  • macOS
  • Windows
  • python-utcp (utcp-cli): < 1.1.2 (Fixed in: 1.1.2)

Mitigation Strategies

  • Upgrade utcp-cli to version 1.1.2 or higher.
  • Implement strict input validation and allowlisting on all tool arguments.
  • Refactor tool definitions to avoid relying on multi-argument expansion from a single placeholder.
  • Run the python-utcp process in a hardened container with minimal privileges.

Remediation Steps:

  1. Identify all deployments of python-utcp and utcp-cli within your environment.
  2. Update the dependencies via your package manager (pip install --upgrade utcp-cli>=1.1.2).
  3. Review existing UTCP tool configurations to ensure no single UTCP_ARG placeholder is used to pass multiple arguments.
  4. Restart the affected services to ensure the patched library is loaded into memory.
  5. Monitor process creation events for anomalous shell activity originating from the python service.

References


Read the full report for CVE-2026-45369 on our website for more details including interactive diagrams and full exploit analysis.

Top comments (0)