


Perceptive Security
SOC/SIEM Consultancy

ByteDance Deer-Flow versions prior to commit 92c7a20 contain a sandbox escape vulnerability in bash tool handling that allows attackers to execute arbitrary com…
Published:
31 maart 2026 om 22:00:00
Alert date:
1 april 2026 om 17:02:06
Source:
nvd.nist.gov
Cloud & Virtualization, Security Tools
ByteDance Deer-Flow versions prior to commit 92c7a20 contain a critical sandbox escape vulnerability in bash tool handling. The vulnerability allows attackers to execute arbitrary commands on the host system by bypassing regex-based validation using shell features like directory changes and relative paths. Attackers can exploit incomplete shell semantics modeling to read and modify files outside the sandbox boundary. The vulnerability enables arbitrary command execution through subprocess invocation with shell interpretation enabled. This represents a significant security flaw that undermines the sandbox security model.
Technical details
Mitigation steps:
Affected products:
ByteDance Deer-Flow
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2026-34430
https://github.com/bytedance/deer-flow/commit/92c7a20cb74addc3038d2131da78f2e239ef542e
https://github.com/bytedance/deer-flow/pull/1547
https://www.vulncheck.com/advisories/bytedance-deerflow-localsandboxprovider-host-bash-escape
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
