CVE-2026-33310 PUBLISHED

Intake has a Command Injection via shell() Expansion in Parameter Defaults

Assigner: GitHub_M
Reserved: 18.03.2026 Published: 24.03.2026 Updated: 24.03.2026

Intake is a package for finding, investigating, loading and disseminating data. Prior to version 2.0.9, the shell() syntax within parameter default values appears to be automatically expanded during the catalog parsing process. If a catalog contains a parameter default such as shell(<command>), the command may be executed when the catalog source is accessed. This means that if a user loads a malicious catalog YAML, embedded commands could execute on the host system. Version 2.0.9 mitigates the issue by making getshell False by default everywhere.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVSS Score: 8.8

Product Status

Vendor intake
Product intake
Versions
  • Version < 2.0.9 is affected

References

Problem Types

  • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') CWE
  • CWE-94: Improper Control of Generation of Code ('Code Injection') CWE