CVE-2026-28279: osctrl is Vulnerable to OS Command Injection via Environment Configuration
An OS command injection vulnerability exists in the osctrl-admin environment configuration. An authenticated administrator can inject arbitrary shell commands via the hostname parameter when creating or editing environments. These commands are embedded into enrollment one-liner scripts generated using Go’s text/template package (which does not perform shell escaping) and execute on every endpoint that enrolls using the compromised environment.
References
Code Behaviors & Features
Detect and mitigate CVE-2026-28279 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →