


Perceptive Security
SOC/SIEM Consultancy

The command auto-approval module in Axon Code contains an OS Command Injection vulnerability, rendering its whitelist security mechanism ineffective. The vulner…
Published:
26 maart 2026 om 23:00:00
Alert date:
27 maart 2026 om 21:04:38
Source:
nvd.nist.gov
Operating Systems, Enterprise Applications
The command auto-approval module in Axon Code contains an OS Command Injection vulnerability that renders its whitelist security mechanism ineffective. The vulnerability stems from incorrect use of a Unix-based shell-quote library to analyze commands on Windows platform, failing to handle Windows CMD-specific escape sequences. Attackers can exploit this parser discrepancy by constructing payloads like 'git log ^" & malicious_command ^"' to achieve arbitrary Remote Code Execution. The Axon Code parser misinterprets the malicious command connector as being within a protected string argument, auto-approving the command, while Windows CMD ignores escaped quotes and executes the malicious command directly.
Technical details
Mitigation steps:
Affected products:
Axon Code
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2026-30303
https://github.com/Secsys-FDU/LLM-Tool-Calling-CVEs/issues/6
https://www.matterai.so/
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
