Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-32094: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in ericcornelissen shescape

0
Medium
VulnerabilityCVE-2026-32094cvecve-2026-32094cwe-200
Published: Wed Mar 11 2026 (03/11/2026, 19:50:10 UTC)
Source: CVE Database V5
Vendor/Project: ericcornelissen
Product: shescape

Description

Shescape is a simple shell escape library for JavaScript. Prior to 2.1.10, Shescape#escape() does not escape square-bracket glob syntax for Bash, BusyBox sh, and Dash. Applications that interpolate the return value directly into a shell command string can cause an attacker-controlled value like secret[12] to expand into multiple filesystem matches instead of a single literal argument, turning one argument into multiple trusted-pathname matches. This vulnerability is fixed in 2.1.10.

AI-Powered Analysis

AILast updated: 03/11/2026, 20:30:47 UTC

Technical Analysis

Shescape is a JavaScript library designed to safely escape strings for use in shell commands. Prior to version 2.1.10, the escape() function failed to properly escape square-bracket glob syntax recognized by common Unix shells such as Bash, BusyBox sh, and Dash. This flaw means that when an application interpolates the output of escape() directly into a shell command, an attacker can supply input containing patterns like secret[12]. Instead of treating this as a literal string, the shell expands it into multiple filesystem matches (e.g., secret1, secret2), effectively turning one argument into multiple arguments. This behavior can lead to unintended exposure of sensitive filesystem paths or data, as the command operates on multiple files rather than a single trusted file. The vulnerability is classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor). Exploitation requires no privileges or user interaction and can be performed remotely if the application accepts attacker-controlled input. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N) indicates network attack vector, low attack complexity, no privileges or user interaction needed, and low impact on confidentiality and integrity. The vulnerability does not affect availability. The issue was publicly disclosed on March 11, 2026, and fixed in shescape version 2.1.10. No known exploits are currently in the wild. Organizations using vulnerable versions should upgrade and review their shell command construction practices to avoid direct interpolation of untrusted input.

Potential Impact

This vulnerability can lead to unintended exposure of sensitive filesystem information by expanding attacker-controlled input into multiple shell glob matches. Organizations that use shescape versions prior to 2.1.10 in applications that construct shell commands by directly interpolating escape() output risk leaking confidential data or exposing trusted pathnames. The impact primarily affects confidentiality and integrity, as attackers may gain insight into filesystem structure or manipulate command arguments. Because exploitation requires no authentication or user interaction and can be triggered remotely, the attack surface is broad for affected applications. However, the impact is limited to scenarios where shell commands are constructed insecurely with untrusted input. There is no direct impact on system availability. Organizations handling sensitive data or running critical infrastructure with vulnerable shescape versions may face increased risk of information disclosure, potentially aiding further attacks or reconnaissance.

Mitigation Recommendations

1. Upgrade all instances of the shescape library to version 2.1.10 or later, where the vulnerability is fixed. 2. Audit all application code that uses shescape#escape() to ensure that the returned strings are not directly interpolated into shell commands without proper sanitization. 3. Avoid constructing shell commands by concatenating or interpolating untrusted input; instead, use safer alternatives such as spawning processes with argument arrays that bypass shell interpretation. 4. Implement strict input validation and sanitization to reject or neutralize glob patterns and other shell metacharacters in user-supplied data. 5. Employ runtime monitoring and alerting for unusual shell command executions that include glob expansions or unexpected argument counts. 6. Educate developers on secure shell command construction practices and the risks of shell injection and glob expansion. 7. Where possible, replace shell command invocations with native APIs or libraries that do not require shell interpretation. 8. Conduct penetration testing focused on injection and glob expansion vectors to verify mitigation effectiveness.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-10T22:02:38.853Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69b1cd382f860ef94372073d

Added to database: 3/11/2026, 8:14:48 PM

Last enriched: 3/11/2026, 8:30:47 PM

Last updated: 3/14/2026, 1:06:48 AM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses