CVE-2026-25807: CWE-94: Improper Control of Generation of Code ('Code Injection') in TaklaXBR zai-shell
CVE-2026-25807 is a high-severity code injection vulnerability in TaklaXBR's zai-shell versions prior to 9. 0. 3. The flaw exists in the P2P terminal sharing feature, which opens an unauthenticated TCP socket on port 5757. Remote attackers can connect to this port and send arbitrary system commands if the session is running in --no-ai mode. Commands execute with the user's privileges if the user approves them without review, bypassing Sentinel safety checks. Exploitation requires user interaction to approve commands but no authentication or prior privileges. The vulnerability impacts confidentiality, integrity, and availability of affected systems. It is fixed in version 9. 0.
AI Analysis
Technical Summary
CVE-2026-25807 is a vulnerability classified under CWE-94 (Improper Control of Generation of Code), affecting TaklaXBR's zai-shell software versions before 9.0.3. The zai-shell is an autonomous SysOps agent designed to manage, repair, and secure complex IT environments. Its P2P terminal sharing feature, invoked via the 'share start' command, opens a TCP socket on port 5757 without any authentication mechanism. This design flaw allows any remote attacker to connect to the socket using a simple socket script. When the zai-shell session is running in --no-ai mode, the attacker can send arbitrary system commands to the host. Although the host user must approve these commands, the approval process lacks content review safeguards, enabling execution of potentially malicious commands with the user's privileges. This bypasses all Sentinel safety checks intended to prevent unauthorized code execution. The vulnerability has a CVSS v3.1 score of 8.8, indicating high severity, with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), and impacts on confidentiality, integrity, and availability all rated high (C:H/I:H/A:H). No known exploits are reported in the wild yet. The vulnerability was publicly disclosed on February 9, 2026, and fixed in zai-shell version 9.0.3. The lack of authentication on the P2P socket and the ability to inject arbitrary commands make this a critical risk for environments relying on zai-shell for autonomous operations, particularly where remote access is enabled.
Potential Impact
The vulnerability allows remote attackers to execute arbitrary system commands on affected zai-shell hosts with the privileges of the logged-in user, potentially leading to full system compromise. This threatens confidentiality by exposing sensitive data accessible to the user account, integrity by allowing unauthorized modification or deletion of files and configurations, and availability by enabling disruptive commands such as service termination or resource exhaustion. For European organizations, especially those in critical infrastructure, finance, or technology sectors relying on zai-shell for automated system operations, this could result in operational disruption, data breaches, and lateral movement within networks. The unauthenticated access to the P2P terminal sharing port increases the attack surface, particularly in environments with exposed or poorly segmented networks. The requirement for user approval reduces but does not eliminate risk, as social engineering or insufficient command review can lead to exploitation. The high CVSS score reflects the significant potential impact and ease of exploitation.
Mitigation Recommendations
1. Upgrade all zai-shell installations to version 9.0.3 or later, where the vulnerability is fixed. 2. If upgrading immediately is not possible, disable the P2P terminal sharing feature ('share start') to prevent opening the unauthenticated TCP socket on port 5757. 3. Restrict network access to port 5757 using firewalls or network segmentation, allowing only trusted hosts to connect. 4. Implement strict operational policies requiring thorough review of any commands presented for user approval, emphasizing verification of command content before acceptance. 5. Monitor network traffic for unexpected connections to port 5757 and unusual command execution patterns. 6. Educate users and administrators about the risks of approving commands without review, especially in --no-ai mode sessions. 7. Employ endpoint detection and response (EDR) solutions to detect anomalous command execution and lateral movement attempts. 8. Regularly audit and update security controls around autonomous SysOps tools to minimize attack surfaces.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy
CVE-2026-25807: CWE-94: Improper Control of Generation of Code ('Code Injection') in TaklaXBR zai-shell
Description
CVE-2026-25807 is a high-severity code injection vulnerability in TaklaXBR's zai-shell versions prior to 9. 0. 3. The flaw exists in the P2P terminal sharing feature, which opens an unauthenticated TCP socket on port 5757. Remote attackers can connect to this port and send arbitrary system commands if the session is running in --no-ai mode. Commands execute with the user's privileges if the user approves them without review, bypassing Sentinel safety checks. Exploitation requires user interaction to approve commands but no authentication or prior privileges. The vulnerability impacts confidentiality, integrity, and availability of affected systems. It is fixed in version 9. 0.
AI-Powered Analysis
Technical Analysis
CVE-2026-25807 is a vulnerability classified under CWE-94 (Improper Control of Generation of Code), affecting TaklaXBR's zai-shell software versions before 9.0.3. The zai-shell is an autonomous SysOps agent designed to manage, repair, and secure complex IT environments. Its P2P terminal sharing feature, invoked via the 'share start' command, opens a TCP socket on port 5757 without any authentication mechanism. This design flaw allows any remote attacker to connect to the socket using a simple socket script. When the zai-shell session is running in --no-ai mode, the attacker can send arbitrary system commands to the host. Although the host user must approve these commands, the approval process lacks content review safeguards, enabling execution of potentially malicious commands with the user's privileges. This bypasses all Sentinel safety checks intended to prevent unauthorized code execution. The vulnerability has a CVSS v3.1 score of 8.8, indicating high severity, with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), and impacts on confidentiality, integrity, and availability all rated high (C:H/I:H/A:H). No known exploits are reported in the wild yet. The vulnerability was publicly disclosed on February 9, 2026, and fixed in zai-shell version 9.0.3. The lack of authentication on the P2P socket and the ability to inject arbitrary commands make this a critical risk for environments relying on zai-shell for autonomous operations, particularly where remote access is enabled.
Potential Impact
The vulnerability allows remote attackers to execute arbitrary system commands on affected zai-shell hosts with the privileges of the logged-in user, potentially leading to full system compromise. This threatens confidentiality by exposing sensitive data accessible to the user account, integrity by allowing unauthorized modification or deletion of files and configurations, and availability by enabling disruptive commands such as service termination or resource exhaustion. For European organizations, especially those in critical infrastructure, finance, or technology sectors relying on zai-shell for automated system operations, this could result in operational disruption, data breaches, and lateral movement within networks. The unauthenticated access to the P2P terminal sharing port increases the attack surface, particularly in environments with exposed or poorly segmented networks. The requirement for user approval reduces but does not eliminate risk, as social engineering or insufficient command review can lead to exploitation. The high CVSS score reflects the significant potential impact and ease of exploitation.
Mitigation Recommendations
1. Upgrade all zai-shell installations to version 9.0.3 or later, where the vulnerability is fixed. 2. If upgrading immediately is not possible, disable the P2P terminal sharing feature ('share start') to prevent opening the unauthenticated TCP socket on port 5757. 3. Restrict network access to port 5757 using firewalls or network segmentation, allowing only trusted hosts to connect. 4. Implement strict operational policies requiring thorough review of any commands presented for user approval, emphasizing verification of command content before acceptance. 5. Monitor network traffic for unexpected connections to port 5757 and unusual command execution patterns. 6. Educate users and administrators about the risks of approving commands without review, especially in --no-ai mode sessions. 7. Employ endpoint detection and response (EDR) solutions to detect anomalous command execution and lateral movement attempts. 8. Regularly audit and update security controls around autonomous SysOps tools to minimize attack surfaces.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-05T19:58:01.642Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 698a592c4b57a58fa173fd9a
Added to database: 2/9/2026, 10:01:16 PM
Last enriched: 2/9/2026, 10:15:55 PM
Last updated: 2/9/2026, 11:13:27 PM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25958: CWE-807: Reliance on Untrusted Inputs in a Security Decision in cube-js cube
HighCVE-2026-25957: CWE-755: Improper Handling of Exceptional Conditions in cube-js cube
MediumCVE-2025-15319: Improper Link Resolution Before File Access ('Link Following') in Tanium Patch Endpoint Tools
HighCVE-2025-15318: Improper Link Resolution Before File Access ('Link Following') in Tanium End-User Notifications Endpoint Tools
MediumCVE-2026-25951: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in frangoteam FUXA
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.