Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-42453: CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') in Termix-SSH Termix

0
High
VulnerabilityCVE-2026-42453cvecve-2026-42453cwe-77
Published: Fri May 08 2026 (05/08/2026, 22:55:30 UTC)
Source: CVE Database V5
Vendor/Project: Termix-SSH
Product: Termix

Description

CVE-2026-42453 is a high-severity command injection vulnerability in Termix, a web-based server management platform. Versions prior to 2. 1. 0 improperly use double-quoted strings in shell command construction for the extractArchive and compressFiles endpoints, allowing command substitution via $(command) on the remote SSH host. This flaw enables an attacker to execute arbitrary commands remotely. The issue has been patched in version 2. 1. 0. No known exploits are reported in the wild.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 05/08/2026, 23:21:30 UTC

Technical Analysis

Termix versions before 2.1.0 contain a command injection vulnerability (CWE-77) in the extractArchive and compressFiles endpoints of the file manager. These endpoints construct shell commands using double quotes, which permit command substitution via $(command). This contrasts with other file manager operations that use single-quote escaping to prevent such injection. An attacker can exploit this to execute arbitrary commands on the remote SSH host. The vulnerability is fixed in Termix version 2.1.0.

Potential Impact

Successful exploitation allows unauthenticated remote attackers to execute arbitrary commands on the SSH host managed by Termix, potentially leading to full system compromise. The CVSS 4.0 base score is 8.7 (high severity), reflecting network attack vector, no privileges or user interaction required, and high impact on integrity.

Mitigation Recommendations

Upgrade Termix to version 2.1.0 or later, where the vulnerability is patched by changing the shell command construction to prevent command substitution. Since this is not a cloud service, manual patching by updating the software is required. Patch status is confirmed by the vendor's versioning information.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-04-27T13:55:58.693Z
Cvss Version
4.0
State
PUBLISHED
Remediation Level
null

Threat ID: 69fe6c74cbff5d86103b91c5

Added to database: 5/8/2026, 11:06:28 PM

Last enriched: 5/8/2026, 11:21:30 PM

Last updated: 5/9/2026, 1:18:43 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses