Home

Description

Turborepo is a high-performance build system for JavaScript and TypeScript codebases. Prior to 2.9.14000, the Turborepo LSP VS Code extension could execute shell commands derived from workspace-controlled values. The extension used string-based command execution for Turborepo daemon commands and task runs. A malicious workspace could provide crafted values through workspace settings or task names in the repository's source code that were interpolated into shell commands. When the extension activated or when a user ran a task through the extension, those values could be interpreted by the user's shell, allowing arbitrary command execution with the privileges of the local VS Code process. This vulnerability is fixed in 2.9.14000.

PUBLISHED Reserved 2026-05-14 | Published 2026-05-15 | Updated 2026-05-15 | Assigner GitHub_M




HIGH: 8.4CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')

Product status

< 2.9.14000
affected

References

github.com/...borepo/security/advisories/GHSA-5xc8-49mv-x4mm

cve.org (CVE-2026-46508)

nvd.nist.gov (CVE-2026-46508)

Download JSON