Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-28279: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in jmpsec osctrl

0
High
VulnerabilityCVE-2026-28279cvecve-2026-28279cwe-78
Published: Thu Feb 26 2026 (02/26/2026, 22:59:29 UTC)
Source: CVE Database V5
Vendor/Project: jmpsec
Product: osctrl

Description

osctrl is an osquery management solution. Prior to version 0.5.0, an OS command injection vulnerability exists in the `osctrl-admin` environment configuration. An authenticated administrator can inject arbitrary shell commands via the hostname parameter when creating or editing environments. These commands are embedded into enrollment one-liner scripts generated using Go's `text/template` package (which does not perform shell escaping) and execute on every endpoint that enrolls using the compromised environment. An attacker with administrator access can achieve remote code execution on every endpoint that enrolls using the compromised environment. Commands execute as root/SYSTEM (the privilege level used for osquery enrollment) before osquery is installed, leaving no agent-level audit trail. This enables backdoor installation, credential exfiltration, and full endpoint compromise. This is fixed in osctrl `v0.5.0`. As a workaround, restrict osctrl administrator access to trusted personnel, review existing environment configurations for suspicious hostnames, and/or monitor enrollment scripts for unexpected commands.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 23:25:23 UTC

Technical Analysis

The vulnerability CVE-2026-28279 affects jmpsec's osctrl, an osquery management solution, in versions before 0.5.0. It is an OS command injection flaw (CWE-78) located in the osctrl-admin environment configuration interface. Specifically, an authenticated administrator can manipulate the hostname parameter when creating or editing environments to inject arbitrary shell commands. These commands are incorporated into enrollment one-liner scripts generated using Go's text/template package, which lacks shell escaping capabilities. Consequently, every endpoint enrolling with the compromised environment executes these injected commands with root or SYSTEM privileges before osquery is installed. This execution context means no agent-level audit logs are generated, allowing attackers to install persistent backdoors, exfiltrate credentials, and fully compromise endpoints. The vulnerability requires high privileges (administrator access) and user interaction (enrollment of endpoints) but has a broad scope since it affects all endpoints enrolling with the environment. The vulnerability is fixed in osctrl version 0.5.0. No known exploits are reported in the wild yet, but the impact potential is significant due to the high privilege and stealthy execution. Workarounds include restricting administrator access to trusted personnel, auditing environment configurations for suspicious hostnames, and monitoring enrollment scripts for unexpected commands.

Potential Impact

This vulnerability enables attackers with administrator access to achieve remote code execution on all endpoints enrolling with a compromised environment, executing commands as root or SYSTEM before osquery installation. This can lead to complete endpoint compromise, including backdoor installation, credential theft, and lateral movement within networks. The lack of agent-level audit trails during execution increases stealth, making detection and forensic analysis difficult. Organizations using osctrl for osquery management face risks of widespread compromise across their endpoint fleet, potentially affecting sensitive data confidentiality, system integrity, and availability. The attack requires administrator privileges on osctrl, so insider threats or compromised administrator accounts pose the greatest risk. The vulnerability's exploitation could severely disrupt enterprise security monitoring and incident response capabilities, as osquery is often used for endpoint visibility and threat detection.

Mitigation Recommendations

1. Upgrade osctrl to version 0.5.0 or later immediately to apply the official fix. 2. Restrict osctrl administrator access strictly to trusted and vetted personnel to reduce the risk of malicious configuration changes. 3. Conduct thorough audits of existing environment configurations, focusing on the hostname parameter, to detect any suspicious or unexpected command injections. 4. Monitor enrollment one-liner scripts for anomalous or unauthorized commands before deployment to endpoints. 5. Implement multi-factor authentication and strong access controls on the osctrl administrative interface to prevent unauthorized access. 6. Use network segmentation and endpoint protection to limit the impact if an endpoint is compromised. 7. Establish logging and alerting mechanisms external to osquery agents to detect unusual enrollment activities or environment changes. 8. Educate administrators on secure configuration practices and the risks of command injection vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-26T01:52:58.734Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a0d31032ffcdb8a2667dff

Added to database: 2/26/2026, 11:11:12 PM

Last enriched: 2/26/2026, 11:25:23 PM

Last updated: 4/13/2026, 6:00:22 AM

Views: 106

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses