Advisory Database
  • Advisories
  • Dependency Scanning
  1. cargo
  2. ›
  3. zeptoclaw
  4. ›
  5. GHSA-5wp8-q9mx-8jx8

GHSA-5wp8-q9mx-8jx8: zeptoclaw has Shell allowlist-blocklist bypass via command/argument injection and file name wildcards

March 5, 2026

zeptoclaw implements a allowlist combined with a blocklist to prevent malicious shell commands in src/security/shell.rs. However, even in the Strict mode, attackers can completely bypass all the guards from allowlist and blocklist:

  • to bypass the allowlist, command injection is enough, such as ;, $() etc.
  • to bypass the REGEX_BLOCKED_PATTERNS, argument injection is enough, such as the python3 -P -c "..."
  • to bypass the LITERAL_BLOCKED_PATTERNS, file name wildcards can do the work, such as cat /etc/pass[w]d

References

  • github.com/advisories/GHSA-5wp8-q9mx-8jx8
  • github.com/qhkm/zeptoclaw
  • github.com/qhkm/zeptoclaw/blob/fe2ef07cfec5bb46b42cdd65f52b9230c03e9270/src/security/shell.rs
  • github.com/qhkm/zeptoclaw/commit/68916c3e4f3af107f11940b27854fc7ef517058b
  • github.com/qhkm/zeptoclaw/security/advisories/GHSA-5wp8-q9mx-8jx8

Code Behaviors & Features

Detect and mitigate GHSA-5wp8-q9mx-8jx8 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 0.6.2

Fixed versions

  • 0.6.2

Solution

Upgrade to version 0.6.2 or above.

Impact 10 CRITICAL

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')

Source file

cargo/zeptoclaw/GHSA-5wp8-q9mx-8jx8.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Thu, 05 Mar 2026 19:03:42 +0000.