{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-0933","assignerOrgId":"a22f1246-ba21-4bb4-a601-ad51614c1513","state":"PUBLISHED","assignerShortName":"cloudflare","dateReserved":"2026-01-14T08:27:27.244Z","datePublished":"2026-01-20T22:58:05.212Z","dateUpdated":"2026-01-23T21:54:58.842Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","packageName":"Wrangler","product":"Wrangler","repo":"https://github.com/cloudflare/workers-sdk","vendor":"Cloudflare","versions":[{"lessThanOrEqual":"v3.114.16","status":"affected","version":"v3.0.0","versionType":"semver"},{"lessThanOrEqual":"v4.59.0","status":"affected","version":"v4.0.0","versionType":"semver"},{"status":"affected","version":"v2.0.15+"}]}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<h2><span style=\"background-color: transparent;\"><b>Summary</b></span></h2><p><span style=\"background-color: transparent;\">A command injection vulnerability (CWE-78) has been found to exist in the `wrangler pages deploy` command. The issue occurs because the `--commit-hash` parameter is passed directly to a shell command without proper validation or sanitization, allowing an attacker with control of `--commit-hash` to execute arbitrary commands on the system running Wrangler.</span></p><p><span style=\"background-color: transparent;\"><br></span></p><h3><span style=\"background-color: transparent;\"><b>Root cause</b></span></h3><p><span style=\"background-color: transparent;\">The </span><span style=\"background-color: rgb(233, 238, 246);\">commitHash</span><span style=\"background-color: transparent;\"> variable, derived from user input via the --commit-hash </span><span style=\"background-color: transparent;\">CLI argument, is interpolated directly into a shell command using template literals (e.g., &nbsp;<span style=\"background-color: rgb(233, 238, 246);\">execSync(`git show -s --format=%B ${commitHash}`)</span><span style=\"background-color: transparent;\">)</span></span><span style=\"background-color: transparent;\">. Shell metacharacters are interpreted by the shell, enabling command execution.</span></p><p><span style=\"background-color: transparent;\"><br></span></p><h3><span style=\"background-color: transparent;\"><b>Impact</b></span></h3><p><span style=\"background-color: transparent;\">This vulnerability is generally hard to exploit, as it requires --commit-hash to be attacker controlled. The vulnerability primarily affects CI/CD environments where `wrangler pages deploy` is used in automated pipelines and the </span></p><p><span style=\"background-color: transparent;\">--commit-hash</span><span style=\"background-color: transparent;\">&nbsp;parameter is populated from external, potentially untrusted sources. An attacker could exploit this to:</span></p><ul><li><span style=\"background-color: transparent;\">Run any shell command.</span></li><li>Exfiltrate environment variables.</li><li>Compromise the CI runner to install backdoors or modify build artifacts.</li></ul><br><h3><span style=\"background-color: transparent;\"><b>Credits</b></span></h3><p><span style=\"background-color: transparent;\"> Disclosed responsibly by </span><span style=\"background-color: rgb(255, 255, 255);\">kny4hacker.</span></p><p><span style=\"background-color: rgb(255, 255, 255);\"><br></span></p><h3>Mitigation<br></h3><ul><li><span style=\"background-color: transparent;\">Wrangler v4 users are requested to upgrade to Wrangler v4.59.1 or higher.</span></li><li>Wrangler v3 users are requested to upgrade to <span style=\"background-color: transparent;\">Wrangler v3.114.17 or higher.</span></li><li>Users on Wrangler v2 (EOL) should upgrade to a supported major version.</li></ul><br><br>"}],"value":"SummaryA command injection vulnerability (CWE-78) has been found to exist in the `wrangler pages deploy` command. The issue occurs because the `--commit-hash` parameter is passed directly to a shell command without proper validation or sanitization, allowing an attacker with control of `--commit-hash` to execute arbitrary commands on the system running Wrangler.\n\n\n\n\nRoot causeThe commitHash variable, derived from user input via the --commit-hash CLI argument, is interpolated directly into a shell command using template literals (e.g.,  execSync(`git show -s --format=%B ${commitHash}`)). Shell metacharacters are interpreted by the shell, enabling command execution.\n\n\n\n\nImpactThis vulnerability is generally hard to exploit, as it requires --commit-hash to be attacker controlled. The vulnerability primarily affects CI/CD environments where `wrangler pages deploy` is used in automated pipelines and the \n\n--commit-hash parameter is populated from external, potentially untrusted sources. An attacker could exploit this to:\n\n  *  Run any shell command.\n  *  Exfiltrate environment variables.\n  *  Compromise the CI runner to install backdoors or modify build artifacts.\n\n\n\nCredits Disclosed responsibly by kny4hacker.\n\n\n\n\nMitigation\n  *  Wrangler v4 users are requested to upgrade to Wrangler v4.59.1 or higher.\n  *  Wrangler v3 users are requested to upgrade to Wrangler v3.114.17 or higher.\n  *  Users on Wrangler v2 (EOL) should upgrade to a supported major version."}],"metrics":[{"cvssV4_0":{"Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","Safety":"NOT_DEFINED","attackComplexity":"LOW","attackRequirements":"PRESENT","attackVector":"NETWORK","baseScore":7.7,"baseSeverity":"HIGH","exploitMaturity":"NOT_DEFINED","privilegesRequired":"LOW","providerUrgency":"NOT_DEFINED","subAvailabilityImpact":"NONE","subConfidentialityImpact":"LOW","subIntegrityImpact":"LOW","userInteraction":"NONE","valueDensity":"NOT_DEFINED","vectorString":"CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:N","version":"4.0","vulnAvailabilityImpact":"HIGH","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"HIGH","vulnerabilityResponseEffort":"NOT_DEFINED"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-20","description":"CWE-20 Improper Input Validation","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"a22f1246-ba21-4bb4-a601-ad51614c1513","shortName":"cloudflare","dateUpdated":"2026-01-20T22:58:05.212Z"},"references":[{"url":"https://github.com/cloudflare/workers-sdk"}],"source":{"discovery":"UNKNOWN"},"title":"OS Command Injection in `wrangler pages deploy`","x_generator":{"engine":"Vulnogram 0.5.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-01-23T18:58:09.879547Z","id":"CVE-2026-0933","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-01-23T21:54:58.842Z"}}]}}