Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22688: CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') in Tencent WeKnora

0
Critical
VulnerabilityCVE-2026-22688cvecve-2026-22688cwe-77
Published: Sat Jan 10 2026 (01/10/2026, 03:41:59 UTC)
Source: CVE Database V5
Vendor/Project: Tencent
Product: WeKnora

Description

WeKnora is an LLM-powered framework designed for deep document understanding and semantic retrieval. Prior to version 0.2.5, there is a command injection vulnerability that allows authenticated users to inject stdio_config.command/args into MCP stdio settings, causing the server to execute subprocesses using these injected values. This issue has been patched in version 0.2.5.

AI-Powered Analysis

AILast updated: 01/10/2026, 04:28:40 UTC

Technical Analysis

Tencent WeKnora is an LLM-powered framework designed for deep document understanding and semantic retrieval. Prior to version 0.2.5, WeKnora contained a critical command injection vulnerability identified as CVE-2026-22688 (CWE-77). This vulnerability arises from improper neutralization of special elements in the stdio_config.command and stdio_config.args parameters, which are injected into the MCP (multiprocess controller) stdio settings. Authenticated users can exploit this flaw by supplying crafted command or argument inputs that the server subsequently executes as subprocesses. This leads to arbitrary command execution on the host system, compromising the server’s confidentiality, integrity, and availability. The vulnerability requires authentication but no further user interaction, making it easier for attackers with valid credentials to exploit. The CVSS v3.1 score is 10.0, reflecting the vulnerability’s critical impact and low attack complexity. Tencent addressed this issue in WeKnora version 0.2.5 by properly sanitizing and validating the command and argument inputs before execution. No public exploits have been reported yet, but the severity and ease of exploitation make this a high-priority patch for affected users.

Potential Impact

For European organizations, exploitation of CVE-2026-22688 could lead to full system compromise of servers running vulnerable versions of WeKnora. Attackers could execute arbitrary commands, potentially leading to data theft, destruction, or ransomware deployment. The confidentiality of sensitive documents processed by WeKnora could be breached, and the integrity of semantic retrieval results compromised. Availability could also be impacted if attackers disrupt or disable the service. Given WeKnora’s role in document understanding, organizations relying on it for critical workflows or intellectual property management face significant operational and reputational risks. The requirement for authentication limits exposure to insiders or compromised accounts, but the lack of user interaction needed means automated attacks are feasible once credentials are obtained. The critical CVSS score underscores the potential for widespread damage if exploited in European enterprises, especially those in sectors like finance, legal, and research that handle sensitive documents.

Mitigation Recommendations

European organizations should immediately upgrade Tencent WeKnora to version 0.2.5 or later, where the vulnerability is patched. Until upgrading, restrict access to WeKnora instances to trusted users and networks only, enforcing strong authentication and monitoring for suspicious command injection attempts in logs. Implement application-layer input validation and sanitization for any user-supplied command or argument parameters, if customization is possible. Employ runtime application self-protection (RASP) or web application firewalls (WAFs) configured to detect and block command injection patterns targeting WeKnora. Conduct regular audits of user privileges to minimize the number of accounts with access to vulnerable features. Additionally, monitor for unusual subprocess executions or unexpected network connections from WeKnora servers. Establish incident response plans specific to command injection scenarios to quickly contain and remediate any exploitation attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-08T19:23:09.854Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6961d21f19784dcf52da7b93

Added to database: 1/10/2026, 4:14:23 AM

Last enriched: 1/10/2026, 4:28:40 AM

Last updated: 1/10/2026, 8:56:02 PM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats