Advisory Database
  • Advisories
  • Dependency Scanning
  1. golang
  2. ›
  3. github.com/digitalocean/droplet-agent
  4. ›
  5. CVE-2026-24516

CVE-2026-24516: DigitalOcean Droplet Agent: Command Injection via Metadata Service Endpoint

March 23, 2026 (updated March 25, 2026)

A command injection vulnerability exists in DigitalOcean Droplet Agent through 1.3.2. The troubleshooting actioner component (internal/troubleshooting/actioner/actioner.go) processes metadata from the metadata service endpoint and executes commands specified in the TroubleshootingAgent.Requesting array without adequate input validation. While the code validates that artifacts exist in the validInvestigationArtifacts map, it fails to sanitize the actual command content after the “command:” prefix. This allows an attacker who can control metadata responses to inject and execute arbitrary OS commands with root privileges. The attack is triggered by sending a TCP packet with specific sequence numbers to the SSH port, which causes the agent to fetch metadata from http://169.254.169.254/metadata/v1.json.

The vulnerability affects the command execution flow in internal/troubleshooting/actioner/actioner.go (insufficient validation), internal/troubleshooting/command/exec.go (direct exec.CommandContext call), and internal/troubleshooting/command/command.go (command parsing without sanitization). This can lead to complete system compromise, data exfiltration, privilege escalation, and potential lateral movement across cloud infrastructure.

References

  • github.com/advisories/GHSA-fh3m-562m-w4f6
  • github.com/digitalocean/droplet-agent
  • github.com/digitalocean/droplet-agent/blob/main/internal/troubleshooting/actioner/actioner.go
  • github.com/digitalocean/droplet-agent/blob/main/internal/troubleshooting/command/command.go
  • github.com/digitalocean/droplet-agent/blob/main/internal/troubleshooting/command/exec.go
  • github.com/poxsky/CVE-2026-24516-DigitalOcean-RCE
  • nvd.nist.gov/vuln/detail/CVE-2026-24516

Code Behaviors & Features

Detect and mitigate CVE-2026-24516 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions up to 0.0.0-20260107162243-1101ffcb5672

Solution

Unfortunately, there is no solution available yet.

Impact 8.8 HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')

Source file

go/github.com/digitalocean/droplet-agent/CVE-2026-24516.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 09 May 2026 12:19:37 +0000.