CVE-2026-4946 PUBLISHED

NSA Ghidra Auto-Analysis Annotation Command Execution

Assigner: AHA
Reserved: 27.03.2026 Published: 29.03.2026 Updated: 30.03.2026

Ghidra versions prior to 12.0.3 improperly process annotation directives embedded in automatically extracted binary data, resulting in arbitrary command execution when an analyst interacts with the UI. Specifically, the @execute annotation (which is intended for trusted, user-authored comments) is also parsed in comments generated during auto-analysis (such as CFStrings in Mach-O binaries). This allows a crafted binary to present seemingly benign clickable text which, when clicked, executes attacker-controlled commands on the analyst’s machine.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVSS Score: 8.8

Product Status

Vendor NSA
Product Ghidra
Versions Default: unaffected
  • affected from 0 to 12.0.3 (excl.)

Credits

  • Mobasi Security Team finder
  • todb of AHA! coordinator

References

Problem Types

  • CWE-78 Improper neutralization of special elements used in an OS command ('OS command injection') CWE