Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0933: CWE-20 Improper Input Validation in Cloudflare Wrangler

0
High
VulnerabilityCVE-2026-0933cvecve-2026-0933cwe-20
Published: Tue Jan 20 2026 (01/20/2026, 22:58:05 UTC)
Source: CVE Database V5
Vendor/Project: Cloudflare
Product: Wrangler

Description

SummaryA command injection vulnerability (CWE-78) has been found to exist in the `wrangler pages deploy` command. The issue occurs because the `--commit-hash` parameter is passed directly to a shell command without proper validation or sanitization, allowing an attacker with control of `--commit-hash` to execute arbitrary commands on the system running Wrangler. Root causeThe commitHash variable, derived from user input via the --commit-hash CLI argument, is interpolated directly into a shell command using template literals (e.g.,  execSync(`git show -s --format=%B ${commitHash}`)). Shell metacharacters are interpreted by the shell, enabling command execution. ImpactThis vulnerability is generally hard to exploit, as it requires --commit-hash to be attacker controlled. The vulnerability primarily affects CI/CD environments where `wrangler pages deploy` is used in automated pipelines and the --commit-hash parameter is populated from external, potentially untrusted sources. An attacker could exploit this to: * Run any shell command. * Exfiltrate environment variables. * Compromise the CI runner to install backdoors or modify build artifacts. Credits Disclosed responsibly by kny4hacker. Mitigation * Wrangler v4 users are requested to upgrade to Wrangler v4.59.1 or higher. * Wrangler v3 users are requested to upgrade to Wrangler v3.114.17 or higher. * Users on Wrangler v2 (EOL) should upgrade to a supported major version.

AI-Powered Analysis

AILast updated: 01/28/2026, 19:56:03 UTC

Technical Analysis

CVE-2026-0933 is a command injection vulnerability classified under CWE-20 (Improper Input Validation) and CWE-78 (OS Command Injection) affecting Cloudflare's Wrangler CLI tool, specifically the `wrangler pages deploy` command. The vulnerability stems from the unsafe handling of the `--commit-hash` parameter, which is directly embedded into a shell command executed via Node.js's execSync function without sanitization or validation. This allows shell metacharacters within the `--commit-hash` input to be interpreted by the shell, enabling arbitrary command execution. The vulnerability is particularly relevant in CI/CD environments where the `--commit-hash` argument might be dynamically populated from external or untrusted sources, such as automated scripts or environment variables. An attacker with the ability to influence this parameter can execute arbitrary shell commands on the system running Wrangler, potentially leading to environment variable leakage, installation of backdoors, or tampering with build artifacts. The vulnerability affects Wrangler versions starting from v2.0.15+, including major versions 3.x and 4.x. Cloudflare has addressed the issue in Wrangler v4.59.1 and v3.114.17, urging users to upgrade accordingly. The CVSS 4.0 vector indicates a network attack vector with low attack complexity, partial privileges required, no user interaction, and high impact on confidentiality, integrity, and availability. No known exploits are currently reported in the wild, but the risk remains significant due to the potential for supply chain compromise and CI/CD pipeline infiltration.

Potential Impact

For European organizations, the impact of CVE-2026-0933 can be substantial, especially for those relying on Cloudflare Wrangler in their CI/CD pipelines for deploying web applications or serverless functions. Exploitation could allow attackers to execute arbitrary commands on build servers or deployment runners, leading to unauthorized access to sensitive environment variables, credentials, or source code. This could result in supply chain attacks where malicious code is injected into production artifacts, undermining software integrity and trust. Additionally, compromised CI/CD infrastructure may serve as a foothold for lateral movement within corporate networks, potentially affecting critical infrastructure and services. Given the widespread adoption of Cloudflare services and Wrangler tooling in Europe, particularly among technology companies, startups, and enterprises leveraging modern DevOps practices, the threat could disrupt business operations, cause data breaches, and damage reputations. The vulnerability's exploitation complexity is moderate due to the need for control over the `--commit-hash` parameter, but automated pipelines that ingest untrusted inputs increase exposure. Organizations in regulated sectors such as finance, healthcare, and government are particularly at risk due to stringent compliance requirements and the criticality of their services.

Mitigation Recommendations

European organizations should take immediate and specific actions to mitigate CVE-2026-0933 beyond generic patching advice: 1) Upgrade all instances of Cloudflare Wrangler to at least v4.59.1 or v3.114.17, avoiding use of EOL versions like v2. 2) Audit CI/CD pipelines to identify any usage of the `wrangler pages deploy` command, especially where the `--commit-hash` parameter is dynamically set from external or user-controlled sources. 3) Implement strict input validation and sanitization on any inputs feeding into the `--commit-hash` parameter to prevent injection of shell metacharacters. 4) Restrict permissions of CI/CD runners and build agents to minimize impact if compromised, employing least privilege principles. 5) Monitor CI/CD logs and environment variables for unusual command executions or anomalies indicative of exploitation attempts. 6) Use containerization or isolated build environments to contain potential damage from command injection. 7) Establish alerting mechanisms for unexpected changes in build artifacts or deployment processes. 8) Educate DevOps teams about the risks of unsanitized inputs in deployment commands and enforce secure coding and pipeline configuration practices. 9) Consider integrating security scanning tools that detect unsafe shell command usage in scripts and automation. 10) Coordinate with Cloudflare support for any additional guidance or updates related to this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
cloudflare
Date Reserved
2026-01-14T08:27:27.244Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69700a534623b1157c5370e7

Added to database: 1/20/2026, 11:05:55 PM

Last enriched: 1/28/2026, 7:56:03 PM

Last updated: 2/7/2026, 1:40:30 PM

Views: 227

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats