Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-4946: CWE-78 Improper neutralization of special elements used in an OS command ('OS command injection') in NSA Ghidra

0
High
VulnerabilityCVE-2026-4946cvecve-2026-4946cwe-78
Published: Sun Mar 29 2026 (03/29/2026, 19:35:30 UTC)
Source: CVE Database V5
Vendor/Project: NSA
Product: Ghidra

Description

Ghidra versions prior to 12.0.3 improperly process annotation directives embedded in automatically extracted binary data, resulting in arbitrary command execution when an analyst interacts with the UI. Specifically, the @execute annotation (which is intended for trusted, user-authored comments) is also parsed in comments generated during auto-analysis (such as CFStrings in Mach-O binaries). This allows a crafted binary to present seemingly benign clickable text which, when clicked, executes attacker-controlled commands on the analyst’s machine.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/29/2026, 20:08:20 UTC

Technical Analysis

CVE-2026-4946 is an OS command injection vulnerability classified under CWE-78 that affects NSA's Ghidra software, a widely used reverse engineering framework. The vulnerability exists in versions prior to 12.0.3 due to improper neutralization of special elements in annotation directives embedded within automatically extracted binary data during Ghidra's auto-analysis phase. Specifically, the @execute annotation, which is intended only for trusted, user-authored comments, is also parsed in comments generated automatically from binary data such as CFStrings in Mach-O binaries. This parsing flaw allows a crafted binary to embed malicious @execute annotations that appear as clickable text in the Ghidra UI. When an analyst clicks this text, the embedded commands execute on the local machine with the analyst's privileges. The vulnerability does not require prior authentication but does require user interaction (clicking the malicious annotation). The CVSS v3.1 score is 8.8 (high severity), reflecting network attack vector, low attack complexity, no privileges required, user interaction required, and high impact on confidentiality, integrity, and availability. Although no exploits are currently known in the wild, the potential for arbitrary command execution poses a significant risk to analysts and organizations relying on Ghidra for malware analysis and reverse engineering tasks.

Potential Impact

The impact of CVE-2026-4946 is substantial for organizations using Ghidra, particularly those involved in malware analysis, vulnerability research, and reverse engineering. Successful exploitation allows attackers to execute arbitrary commands on the analyst's workstation, potentially leading to full system compromise. This can result in theft or manipulation of sensitive data, disruption of analysis workflows, and lateral movement within an organization's network if the analyst's machine is connected to internal resources. Since Ghidra is often used in security-sensitive environments, compromise of an analyst's system could undermine incident response and threat intelligence efforts. The requirement for user interaction (clicking the malicious annotation) somewhat limits automated exploitation but does not eliminate risk, especially in targeted attacks or supply chain scenarios where crafted binaries are analyzed. The vulnerability affects confidentiality, integrity, and availability of the analyst's system and potentially the broader network environment.

Mitigation Recommendations

To mitigate CVE-2026-4946, organizations should immediately upgrade all Ghidra installations to version 12.0.3 or later, where the vulnerability is patched. Analysts should avoid opening or interacting with untrusted or suspicious binaries in Ghidra until the update is applied. Implement strict operational security policies that restrict analysis of unknown binaries to isolated, sandboxed environments to contain potential exploitation. Disable or limit clickable annotations in the UI if possible, or configure Ghidra to ignore @execute annotations in auto-generated comments. Educate analysts about the risk of clicking on unexpected or suspicious UI elements within Ghidra. Monitor analyst workstations for unusual command execution or system behavior. Additionally, consider network segmentation and endpoint detection solutions to detect and contain any compromise resulting from exploitation. Regularly review and audit reverse engineering tools and workflows for similar risks.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
AHA
Date Reserved
2026-03-27T02:17:29.992Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69c9832de6bfc5ba1dd34820

Added to database: 3/29/2026, 7:53:17 PM

Last enriched: 3/29/2026, 8:08:20 PM

Last updated: 3/29/2026, 8:56:33 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses