CVE-2026-6118 Scanner

CVE-2026-6118 Scanner - Command Injection vulnerability in AstrBot

Short Info


Level

High

Single Scan

Single Scan

Can be used by

Asset Owner

Estimated Time

10 seconds

Time Interval

15 days 23 hours

Scan only one

Domain, Subdomain, IPv4

Toolbox

AstrBot is a platform commonly used by developers and system administrators to automate and manage various operational tasks. The software provides a comprehensive environment to execute automated scripts and processes on multiple server environments. Organizations employ AstrBot to enhance operational efficiency by automating repetitive tasks and managing server configurations. It mainly finds its use in cloud environments, where tasks need to be performed uniformly across distributed systems. The AstrBot application typically allows designated users to access its dashboard for configuring and monitoring execution of various scripts. Due to its capability to interface with critical operational components, secure handling of its processes is crucial.

The Command Injection vulnerability in AstrBot allows authenticated attackers to execute arbitrary system commands. This issue arises due to improper validation in the MCP server configuration endpoint. The vulnerability is triggered when unvalidated input via the 'command' and 'args' fields in the API endpoint is executed by the system. As a result, attackers with sufficient privilege levels can exploit this weakness to run unauthorized commands. This type of flaw can give attackers the ability to manipulate how the software executes system-level tasks. Failure to address this vulnerability could lead to significant security risks and potential data breaches.

The vulnerability arises within the '/api/tools/mcp/add' endpoint of AstrBot. Specifically, the endpoint accepts user input in the 'command' and 'args' parameters, which are then executed without proper validation. This oversight allows an attacker to inject arbitrary commands that get executed by the AstrBot service. Attackers must have authenticated access to interact with the vulnerable endpoint, typically requiring a valid session token. This vulnerability can potentially be abused to execute system commands, exfiltrate data, or modify system configurations without authorization. Since the executed commands occur with the privileges of the AstrBot process, exploitation can lead to far-reaching effects.

Exploiting this vulnerability provides malicious actors with direct access to system functions, leading to potential server compromise. Attackers may leverage this flaw to perform tasks such as data exfiltration, deletion of important files, or pivoting to more sensitive parts of the network. There is also the risk of installing malware or other malicious software to gain broader control over the affected systems. Moreover, this could undermine the trust between connected systems and lead to financial and reputational damages to the affected organization. Secondary effects may include disruption of service, unauthorized transactions, and loss of sensitive information.

REFERENCES

Get started to protecting your digital assets