LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →
Home / Vulnerability Intelligence / CVE-2026-35582

CVE-2026-35582 - Vulnerability Analysis

HighCVSS: 8.8

Last Updated: April 18, 2026

Emissary - Command Injection

Published: April 18, 2026Updated: April 18, 2026

Overview

Emissary <= 8.42.0 contains a command injection caused by unsanitized interpolation of temporary file paths in /bin/sh -c commands in Executrix.getCommand(), letting place authors execute OS commands, exploit requires place configuration authorship.

Severity & Score

Severity: High
CVSS Score: 8.8
EPSS Score: 0.0%(Probability of exploitation in next 30 days)

Impact

Place authors can execute arbitrary OS commands in the JVM process, potentially compromising the system.

Mitigation

Upgrade to version 8.43.0 or later.

Social Media Activity(2 posts)

TheHackerWire
TheHackerWire
@thehackerwire
Apr 18, 2026

🟠 CVE-2026-35582 - High (8.8) Emissary is a P2P based data-driven workflow engine. In versions 8.42.0 and below, Executrix.getCommand() is vulnerable to OS command injection because it interpolates temporary file paths into a /bin/sh -c shell command string without any escapi... šŸ”— https://www.thehackerwire.com/vulnerability/CVE-2026-35582/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

View original post
TheHackerWire
TheHackerWire
@thehackerwire
Apr 18, 2026

🟠 CVE-2026-35582 - High (8.8) Emissary is a P2P based data-driven workflow engine. In versions 8.42.0 and below, Executrix.getCommand() is vulnerable to OS command injection because it interpolates temporary file paths into a /bin/sh -c shell command string without any escapi... šŸ”— https://www.thehackerwire.com/vulnerability/CVE-2026-35582/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

View original post

Details

CVE ID
CVE-2026-35582
Severity
High
CVSS Score
8.8
Type
command_injection
Status
new
EPSS
0.0%
Social Posts
2

CWE

  • CWE-78

CVSS Metrics

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

EPSS Score

0.0%Probability of exploitation in the next 30 days