top of page
perceptive_background_267k.jpg

The command auto-approval module in Axon Code contains an OS Command Injection vulnerability, rendering its whitelist security mechanism ineffective. The vulner…

Published:

26 March 2026 at 23:00:00

Alert date:

27 March 2026 at 21:04:38

Source:

nvd.nist.gov

Click to open the original link from this advisory

Operating Systems, Enterprise Applications

The command auto-approval module in Axon Code contains an OS Command Injection vulnerability that renders its whitelist security mechanism ineffective. The vulnerability stems from incorrect use of a Unix-based shell-quote library to analyze commands on Windows platform, failing to handle Windows CMD-specific escape sequences. Attackers can exploit this parser discrepancy by constructing payloads like 'git log ^" & malicious_command ^"' to achieve arbitrary Remote Code Execution. The Axon Code parser misinterprets the malicious command connector as being within a protected string argument, auto-approving the command, while Windows CMD ignores escaped quotes and executes the malicious command directly.

Technical details

Mitigation steps:

Affected products:

Axon Code

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Disclaimer: Deze website toont informatie afkomstig van externe bronnen. Perceptive aanvaardt geen verantwoordelijkheid voor de inhoud, juistheid of volledigheid van deze informatie.

bottom of page