CVE-2026-33310 - Intake has a Command Injection via shell() Expansion in Parameter Defaults
CVE ID :CVE-2026-33310
Published : March 24, 2026, 2:16 p.m. | 46 minutes ago
Description :Intake is a package for finding, investigating, loading and disseminating data. Prior to version 2.0.9, the shell() syntax within parameter default values appears to be automatically expanded during the catalog parsing process. If a catalog contains a parameter default such as shell(), the command may be executed when the catalog source is accessed. This means that if a user loads a malicious catalog YAML, embedded commands could execute on the host system. Version 2.0.9 mitigates the issue by making getshell False by default everywhere.
Severity: 8.8 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
Published : March 24, 2026, 2:16 p.m. | 46 minutes ago
Description :Intake is a package for finding, investigating, loading and disseminating data. Prior to version 2.0.9, the shell() syntax within parameter default values appears to be automatically expanded during the catalog parsing process. If a catalog contains a parameter default such as shell(
Severity: 8.8 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...