Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2026-9277
PUBLISHED
More InfoOfficial Page
Assigner-harborist
Assigner Org ID-7ffcee3d-2c14-4c3e-b844-86c6a321a158
View Known Exploited Vulnerability (KEV) details
Published At-22 May, 2026 | 13:22
Updated At-23 May, 2026 | 03:04
Rejected At-
▼CVE Numbering Authority (CNA)
shell-quote `quote()` does not validate object-token shapes, allowing command injection via line terminators in `.op`

shell-quote's `quote()` function did not validate object-token inputs against the operator model used by `parse()`. The `.op` field was backslash-escaped character by character using `/(.)/g`, which in JavaScript does not match line terminators (\n, \r, U+2028, U+2029). A line terminator in `.op` therefore passed through unescaped into the output; POSIX shells treat a literal newline as a command separator, so any content after it would execute as a second command. The vulnerable code path is reachable in two ways: (1) direct construction of `{ op: '...\n...' }` from external input, and (2) via `parse(cmd, envFn)` when `envFn` returns object tokens whose `.op` is attacker-influenced. Both are documented API surface. Fixed by replacing the per-character escape with strict shape validation: `.op` must match the parser's control-operator allowlist; `{ op: 'glob', pattern }` validates `pattern` and forbids line terminators; `{ comment }` validates `comment` and forbids line terminators; any other object shape throws `TypeError`.

Affected Products
Product
shell-quote
Collection URL
https://www.npmjs.com/package/shell-quote
Package Name
shell-quote
Repo
https://github.com/ljharb/shell-quote
Program Files
  • quote.js
Default Status
unaffected
Versions
Affected
  • From 1.1.0 before 1.8.4 (semver)
Problem Types
TypeCWE IDDescription
CWECWE-78CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CWECWE-77CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection')
Type: CWE
CWE ID: CWE-78
Description: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Type: CWE
CWE ID: CWE-77
Description: CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection')
Metrics
VersionBase scoreBase severityVector
3.18.1HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
4.09.2CRITICAL
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Version: 3.1
Base score: 8.1
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Version: 4.0
Base score: 9.2
Base severity: CRITICAL
Vector:
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

finder
Akshat Sinha (@akshatgit)
remediation developer
Jordan Harband (@ljharb)
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/ljharb/shell-quote/security/advisories/GHSA-w7jw-789q-3m8p
vendor-advisory
https://github.com/ljharb/shell-quote/commit/1518179
patch
https://github.com/ljharb/shell-quote
product
https://www.npmjs.com/package/shell-quote
product
Hyperlink: https://github.com/ljharb/shell-quote/security/advisories/GHSA-w7jw-789q-3m8p
Resource:
vendor-advisory
Hyperlink: https://github.com/ljharb/shell-quote/commit/1518179
Resource:
patch
Hyperlink: https://github.com/ljharb/shell-quote
Resource:
product
Hyperlink: https://www.npmjs.com/package/shell-quote
Resource:
product
▼Authorized Data Publishers (ADP)
1. CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/ljharb/shell-quote/security/advisories/GHSA-w7jw-789q-3m8p
exploit
Hyperlink: https://github.com/ljharb/shell-quote/security/advisories/GHSA-w7jw-789q-3m8p
Resource:
exploit
2. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.openwall.com/lists/oss-security/2026/05/23/2
N/A
Hyperlink: http://www.openwall.com/lists/oss-security/2026/05/23/2
Resource: N/A
Details not found