CVE-2026-25046: CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') in MoonshotAI kimi-agent-sdk
CVE-2026-25046 is a command injection vulnerability in the development scripts (vsix-publish. js and ovsx-publish. js) of MoonshotAI's kimi-agent-sdk prior to version 0. 1. 6. The issue arises because these scripts pass filenames containing shell metacharacters directly to execSync(), allowing arbitrary command execution if filenames are maliciously crafted. This vulnerability affects only the development environment scripts and not the published VSCode extension, so end users are not impacted. The flaw is fixed in version 0. 1. 6 by switching to execFileSync with array arguments, which safely handles filenames.
AI Analysis
Technical Summary
CVE-2026-25046 is a command injection vulnerability classified under CWE-77 found in the MoonshotAI kimi-agent-sdk development scripts, specifically vsix-publish.js and ovsx-publish.js. These scripts use Node.js's execSync() function to execute shell commands constructed by concatenating filenames directly into command strings. If a filename contains shell metacharacters such as $(cmd), it can lead to arbitrary command execution on the host system. This vulnerability exists only in the repository's development scripts and does not affect the published VSCode extension, which excludes these files. The root cause is improper neutralization of special shell elements in filenames passed to execSync(), allowing injection of malicious commands. The vulnerability is fixed in version 0.1.6 by replacing execSync() with execFileSync(), which accepts an array of arguments and prevents shell interpretation of filenames. Exploitation requires local access with high privileges to run the vulnerable scripts and user interaction to provide malicious filenames. There are no known exploits in the wild. The CVSS v3.1 base score is 2.9, reflecting low confidentiality and integrity impact, high attack complexity, requirement for privileges and user interaction, and no impact on availability.
Potential Impact
For European organizations, the impact of this vulnerability is limited primarily to development environments where the vulnerable kimi-agent-sdk scripts are used. Since the vulnerability requires local execution of development scripts with malicious filenames, it does not pose a direct threat to production systems or end users. However, if an attacker gains local access to a developer's machine or build environment, they could execute arbitrary commands with the privileges of the user running the scripts, potentially leading to code execution or environment compromise. This could result in unauthorized access to source code, build artifacts, or credentials stored in the development environment. The low CVSS score and absence of known exploits indicate a low likelihood of widespread impact. Nonetheless, organizations with strict development security policies or those using these scripts in automated CI/CD pipelines should be cautious to prevent supply chain or insider threats.
Mitigation Recommendations
European organizations should upgrade the kimi-agent-sdk to version 0.1.6 or later, where the vulnerability is fixed by using execFileSync() with argument arrays to safely handle filenames. Until upgrading, developers must ensure that all .vsix files or other inputs used by the vsix-publish.js and ovsx-publish.js scripts have sanitized filenames free of shell metacharacters such as $(), ``, ;, &, |, or other command injection vectors. Implement strict filename validation or whitelisting in build and publish scripts. Restrict access to development environments and scripts to trusted personnel only. Employ code review and static analysis tools to detect unsafe use of execSync() or similar functions in scripts. Additionally, consider running development scripts in isolated containers or sandboxes to limit the impact of potential command injection. Regularly audit development tools and scripts for security best practices to prevent similar issues.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden
CVE-2026-25046: CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') in MoonshotAI kimi-agent-sdk
Description
CVE-2026-25046 is a command injection vulnerability in the development scripts (vsix-publish. js and ovsx-publish. js) of MoonshotAI's kimi-agent-sdk prior to version 0. 1. 6. The issue arises because these scripts pass filenames containing shell metacharacters directly to execSync(), allowing arbitrary command execution if filenames are maliciously crafted. This vulnerability affects only the development environment scripts and not the published VSCode extension, so end users are not impacted. The flaw is fixed in version 0. 1. 6 by switching to execFileSync with array arguments, which safely handles filenames.
AI-Powered Analysis
Technical Analysis
CVE-2026-25046 is a command injection vulnerability classified under CWE-77 found in the MoonshotAI kimi-agent-sdk development scripts, specifically vsix-publish.js and ovsx-publish.js. These scripts use Node.js's execSync() function to execute shell commands constructed by concatenating filenames directly into command strings. If a filename contains shell metacharacters such as $(cmd), it can lead to arbitrary command execution on the host system. This vulnerability exists only in the repository's development scripts and does not affect the published VSCode extension, which excludes these files. The root cause is improper neutralization of special shell elements in filenames passed to execSync(), allowing injection of malicious commands. The vulnerability is fixed in version 0.1.6 by replacing execSync() with execFileSync(), which accepts an array of arguments and prevents shell interpretation of filenames. Exploitation requires local access with high privileges to run the vulnerable scripts and user interaction to provide malicious filenames. There are no known exploits in the wild. The CVSS v3.1 base score is 2.9, reflecting low confidentiality and integrity impact, high attack complexity, requirement for privileges and user interaction, and no impact on availability.
Potential Impact
For European organizations, the impact of this vulnerability is limited primarily to development environments where the vulnerable kimi-agent-sdk scripts are used. Since the vulnerability requires local execution of development scripts with malicious filenames, it does not pose a direct threat to production systems or end users. However, if an attacker gains local access to a developer's machine or build environment, they could execute arbitrary commands with the privileges of the user running the scripts, potentially leading to code execution or environment compromise. This could result in unauthorized access to source code, build artifacts, or credentials stored in the development environment. The low CVSS score and absence of known exploits indicate a low likelihood of widespread impact. Nonetheless, organizations with strict development security policies or those using these scripts in automated CI/CD pipelines should be cautious to prevent supply chain or insider threats.
Mitigation Recommendations
European organizations should upgrade the kimi-agent-sdk to version 0.1.6 or later, where the vulnerability is fixed by using execFileSync() with argument arrays to safely handle filenames. Until upgrading, developers must ensure that all .vsix files or other inputs used by the vsix-publish.js and ovsx-publish.js scripts have sanitized filenames free of shell metacharacters such as $(), ``, ;, &, |, or other command injection vectors. Implement strict filename validation or whitelisting in build and publish scripts. Restrict access to development environments and scripts to trusted personnel only. Employ code review and static analysis tools to detect unsafe use of execSync() or similar functions in scripts. Additionally, consider running development scripts in isolated containers or sandboxes to limit the impact of potential command injection. Regularly audit development tools and scripts for security best practices to prevent similar issues.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-01-28T14:50:47.886Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 697bd7ddac06320222bd31ac
Added to database: 1/29/2026, 9:57:49 PM
Last enriched: 2/6/2026, 8:41:56 AM
Last updated: 2/6/2026, 2:05:21 PM
Views: 22
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1337: CWE-117 Improper Output Neutralization for Logs in neo4j Enterprise Edition
LowCVE-2025-13818: CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition in ESET spol s.r.o. ESET Management Agent
HighCVE-2026-2055: Information Disclosure in D-Link DIR-605L
MediumCVE-2026-2054: Information Disclosure in D-Link DIR-605L
MediumCVE-2026-2018: SQL Injection in itsourcecode School Management System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.