CVE-2026-31861: CWE-94: Improper Control of Generation of Code ('Code Injection') in siteboon claudecodeui
CVE-2026-31861 is a high-severity code injection vulnerability in siteboon's Cloud CLI (Claude Code UI) versions prior to 1. 24. 0. The flaw exists in the /api/user/git-config endpoint, which improperly constructs shell commands by interpolating user-supplied gitName and gitEmail values into commands executed via child_process. exec(). Although double quotes are used and " is escaped, bash still interprets backticks, $() command substitutions, and certain escape sequences within double-quoted strings, enabling authenticated attackers to execute arbitrary OS commands. No user interaction or elevated privileges beyond authentication are required to exploit this vulnerability. The issue is fixed in version 1. 24. 0.
AI Analysis
Technical Summary
CVE-2026-31861 is a code injection vulnerability categorized under CWE-94 affecting siteboon's Cloud CLI (Claude Code UI) prior to version 1.24.0. The vulnerability arises from insecure handling of user input in the /api/user/git-config API endpoint, which constructs shell commands by embedding user-supplied gitName and gitEmail values directly into command strings executed via Node.js's child_process.exec(). While the input is enclosed in double quotes and the double quote character is escaped, bash shell semantics allow interpretation of backticks (`), command substitution via $(), and certain escape sequences even within double-quoted strings. This oversight enables an authenticated attacker to inject malicious shell commands that the system executes with the privileges of the running process. The attack vector requires authentication but no additional user interaction or elevated privileges. The vulnerability has a CVSS 4.0 score of 8.7, reflecting its high severity due to the potential for full system compromise, data exfiltration, or disruption of services. The flaw was publicly disclosed on March 11, 2026, and fixed in version 1.24.0 of the product. No known exploits are currently reported in the wild. The root cause is improper sanitization and escaping of shell metacharacters in user input used in command execution contexts, a common pitfall in applications that dynamically generate shell commands. Remediation involves upgrading to the patched version and adopting safer coding practices such as avoiding direct shell command construction with user input, using parameterized APIs like child_process.execFile or spawn, and implementing rigorous input validation and sanitization.
Potential Impact
The impact of CVE-2026-31861 is significant for organizations using vulnerable versions of Cloud CLI (Claude Code UI). Successful exploitation allows authenticated attackers to execute arbitrary operating system commands with the privileges of the application process, potentially leading to full system compromise. This can result in unauthorized data access or modification, installation of persistent malware, lateral movement within networks, and disruption or destruction of services. Given the CLI nature of the product, attackers could leverage this to manipulate development workflows, inject malicious code into repositories, or exfiltrate sensitive configuration data. The vulnerability's ease of exploitation—requiring only authentication and no user interaction—heightens the risk. Organizations relying on this tool for development or automation may face operational downtime, reputational damage, and compliance violations if exploited. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as proof-of-concept code may emerge following disclosure.
Mitigation Recommendations
To mitigate CVE-2026-31861, organizations should immediately upgrade siteboon's Cloud CLI (Claude Code UI) to version 1.24.0 or later, where the vulnerability is fixed. Until upgrade is possible, restrict access to the /api/user/git-config endpoint to trusted users only and monitor for suspicious activity. Developers should avoid constructing shell commands by concatenating or interpolating user input; instead, use safer Node.js APIs such as child_process.execFile or spawn that accept arguments as arrays, preventing shell interpretation. Implement strict input validation and sanitization on gitName and gitEmail fields to disallow shell metacharacters like backticks, dollar signs, and backslashes. Employ application-layer firewalls or runtime application self-protection (RASP) solutions to detect and block command injection attempts. Conduct thorough code reviews and security testing focusing on command execution paths. Finally, maintain robust authentication and logging to detect and respond to potential exploitation attempts promptly.
Affected Countries
United States, Germany, United Kingdom, Canada, France, Australia, Japan, South Korea, India, Netherlands, Sweden, Singapore
CVE-2026-31861: CWE-94: Improper Control of Generation of Code ('Code Injection') in siteboon claudecodeui
Description
CVE-2026-31861 is a high-severity code injection vulnerability in siteboon's Cloud CLI (Claude Code UI) versions prior to 1. 24. 0. The flaw exists in the /api/user/git-config endpoint, which improperly constructs shell commands by interpolating user-supplied gitName and gitEmail values into commands executed via child_process. exec(). Although double quotes are used and " is escaped, bash still interprets backticks, $() command substitutions, and certain escape sequences within double-quoted strings, enabling authenticated attackers to execute arbitrary OS commands. No user interaction or elevated privileges beyond authentication are required to exploit this vulnerability. The issue is fixed in version 1. 24. 0.
AI-Powered Analysis
Technical Analysis
CVE-2026-31861 is a code injection vulnerability categorized under CWE-94 affecting siteboon's Cloud CLI (Claude Code UI) prior to version 1.24.0. The vulnerability arises from insecure handling of user input in the /api/user/git-config API endpoint, which constructs shell commands by embedding user-supplied gitName and gitEmail values directly into command strings executed via Node.js's child_process.exec(). While the input is enclosed in double quotes and the double quote character is escaped, bash shell semantics allow interpretation of backticks (`), command substitution via $(), and certain escape sequences even within double-quoted strings. This oversight enables an authenticated attacker to inject malicious shell commands that the system executes with the privileges of the running process. The attack vector requires authentication but no additional user interaction or elevated privileges. The vulnerability has a CVSS 4.0 score of 8.7, reflecting its high severity due to the potential for full system compromise, data exfiltration, or disruption of services. The flaw was publicly disclosed on March 11, 2026, and fixed in version 1.24.0 of the product. No known exploits are currently reported in the wild. The root cause is improper sanitization and escaping of shell metacharacters in user input used in command execution contexts, a common pitfall in applications that dynamically generate shell commands. Remediation involves upgrading to the patched version and adopting safer coding practices such as avoiding direct shell command construction with user input, using parameterized APIs like child_process.execFile or spawn, and implementing rigorous input validation and sanitization.
Potential Impact
The impact of CVE-2026-31861 is significant for organizations using vulnerable versions of Cloud CLI (Claude Code UI). Successful exploitation allows authenticated attackers to execute arbitrary operating system commands with the privileges of the application process, potentially leading to full system compromise. This can result in unauthorized data access or modification, installation of persistent malware, lateral movement within networks, and disruption or destruction of services. Given the CLI nature of the product, attackers could leverage this to manipulate development workflows, inject malicious code into repositories, or exfiltrate sensitive configuration data. The vulnerability's ease of exploitation—requiring only authentication and no user interaction—heightens the risk. Organizations relying on this tool for development or automation may face operational downtime, reputational damage, and compliance violations if exploited. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as proof-of-concept code may emerge following disclosure.
Mitigation Recommendations
To mitigate CVE-2026-31861, organizations should immediately upgrade siteboon's Cloud CLI (Claude Code UI) to version 1.24.0 or later, where the vulnerability is fixed. Until upgrade is possible, restrict access to the /api/user/git-config endpoint to trusted users only and monitor for suspicious activity. Developers should avoid constructing shell commands by concatenating or interpolating user input; instead, use safer Node.js APIs such as child_process.execFile or spawn that accept arguments as arrays, preventing shell interpretation. Implement strict input validation and sanitization on gitName and gitEmail fields to disallow shell metacharacters like backticks, dollar signs, and backslashes. Employ application-layer firewalls or runtime application self-protection (RASP) solutions to detect and block command injection attempts. Conduct thorough code reviews and security testing focusing on command execution paths. Finally, maintain robust authentication and logging to detect and respond to potential exploitation attempts promptly.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-09T19:02:25.012Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69b1aa112f860ef943525d82
Added to database: 3/11/2026, 5:44:49 PM
Last enriched: 3/11/2026, 6:00:01 PM
Last updated: 3/11/2026, 6:46:13 PM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.