CVE-2026-42453 PUBLISHED

Termix: Command injection in extractArchive/compressFiles via double-quote escaping bypass

Assigner: GitHub_M
Reserved: 27.04.2026 Published: 08.05.2026 Updated: 08.05.2026

Termix is a web-based server management platform with SSH terminal, tunneling, and file editing capabilities. Prior to version 2.1.0, the extractArchive and compressFiles endpoints in file-manager.ts use double-quoted strings for shell command construction, unlike all other file manager operations which use single-quote escaping. Double quotes allow $(command) substitution, enabling command injection on the remote SSH host. This issue has been patched in version 2.1.0.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
CVSS Score: 8.7

Product Status

Vendor Termix-SSH
Product Termix
Versions
  • Version < 2.1.0 is affected

References

Problem Types

  • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') CWE