Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-28617: n/a

0
High
VulnerabilityCVE-2023-28617cvecve-2023-28617
Published: Sun Mar 19 2023 (03/19/2023, 00:00:00 UTC)
Source: CVE Database V5

Description

org-babel-execute:latex in ob-latex.el in Org Mode through 9.6.1 for GNU Emacs allows attackers to execute arbitrary commands via a file name or directory name that contains shell metacharacters.

AI-Powered Analysis

AILast updated: 11/03/2025, 22:03:10 UTC

Technical Analysis

CVE-2023-28617 is a command injection vulnerability found in the org-babel-execute:latex function of the ob-latex.el component in Org Mode for GNU Emacs, affecting versions through 9.6.1. Org Mode is a popular Emacs extension used for organizing notes, project planning, and literate programming, with support for executing code blocks in various languages including LaTeX. The vulnerability arises because the function improperly handles file or directory names containing shell metacharacters when executing LaTeX code blocks. An attacker who can influence these names can inject arbitrary shell commands that the system will execute. The CVSS 3.1 vector (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) indicates that exploitation requires local access and user interaction but no privileges, and the impact on confidentiality, integrity, and availability is high. This vulnerability is classified under CWE-78 (Improper Neutralization of Special Elements used in an OS Command). Although no public exploits are known, the risk is significant due to the potential for arbitrary code execution. The vulnerability affects users who run LaTeX code blocks in Org Mode, which is common in academic and research environments, as well as among developers using Emacs for literate programming. Since the flaw involves shell metacharacter injection, it can lead to full system compromise if exploited. No patches were linked at the time of reporting, so users must monitor for updates or apply mitigations.

Potential Impact

For European organizations, this vulnerability poses a significant risk especially in sectors relying heavily on GNU Emacs and Org Mode for documentation, research, and development workflows, such as universities, research institutes, and software companies. Successful exploitation can lead to arbitrary command execution, resulting in data breaches, system compromise, or disruption of critical services. The high impact on confidentiality, integrity, and availability means sensitive research data or intellectual property could be exposed or altered. Since exploitation requires local access and user interaction, insider threats or social engineering attacks could leverage this vulnerability. The lack of known exploits in the wild reduces immediate risk but does not eliminate the threat, particularly in environments where Emacs is widely used and users may open files from untrusted sources. The vulnerability could also be leveraged as a foothold for lateral movement within networks.

Mitigation Recommendations

1. Monitor official GNU Emacs and Org Mode repositories for patches addressing CVE-2023-28617 and apply updates promptly once available. 2. Until patches are released, avoid executing LaTeX code blocks in Org Mode on files or directories with untrusted or suspicious names containing shell metacharacters. 3. Implement strict local user permissions to limit the ability of unprivileged users to execute code or modify files used by Org Mode. 4. Educate users about the risks of opening or executing code blocks from untrusted sources, emphasizing caution with file and directory names. 5. Use application whitelisting or sandboxing techniques to restrict the execution environment of Emacs and its subprocesses. 6. Employ monitoring and logging to detect unusual command executions or shell activity originating from Emacs processes. 7. Consider disabling org-babel LaTeX execution if it is not essential to reduce the attack surface.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2023-03-19T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69092143fe7723195e053ef1

Added to database: 11/3/2025, 9:40:19 PM

Last enriched: 11/3/2025, 10:03:10 PM

Last updated: 11/6/2025, 2:10:59 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats