CVE-2026-46508 PUBLISHED

Turborepo: VSCode Extension command injection

Assigner: GitHub_M
Reserved: 14.05.2026 Published: 15.05.2026 Updated: 15.05.2026

Turborepo is a high-performance build system for JavaScript and TypeScript codebases. Prior to 2.9.14000, the Turborepo LSP VS Code extension could execute shell commands derived from workspace-controlled values. The extension used string-based command execution for Turborepo daemon commands and task runs. A malicious workspace could provide crafted values through workspace settings or task names in the repository's source code that were interpolated into shell commands. When the extension activated or when a user ran a task through the extension, those values could be interpreted by the user's shell, allowing arbitrary command execution with the privileges of the local VS Code process. This vulnerability is fixed in 2.9.14000.

Metrics

CVSS Vector: CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CVSS Score: 8.4

Product Status

Vendor vercel
Product turborepo
Versions
  • Version < 2.9.14000 is affected

References

Problem Types

  • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') CWE