Description
OpenShell before 2026.3.28 contains an arbitrary code execution vulnerability in mirror mode that converts untrusted sandbox files into workspace hooks. Attackers with mirror mode access can execute arbitrary code on the host during gateway startup by exploiting enabled workspace hooks.
Problem types
CWE-829: Inclusion of Functionality from Untrusted Control Sphere
Product status
Any version before 2026.3.28
2026.3.28 (semver)
Credits
tdjackey
References
github.com/...enclaw/security/advisories/GHSA-42mx-vp8m-j7qh (GitHub Security Advisory (GHSA-42mx-vp8m-j7qh))
github.com/...ommit/c02ee8a3a4cb390b23afdf21317aa8b2096854d1 (Patch Commit)
www.vulncheck.com/...via-mirror-mode-sandbox-file-conversion (VulnCheck Advisory: OpenShell < 2026.3.28 - Arbitrary Code Execution via Mirror Mode Sandbox File Conversion)