VYPR
Low severityNVD Advisory· Published Jul 27, 2025· Updated Jul 28, 2025

CVE-2024-58266

CVE-2024-58266

Description

The shlex crate before 1.2.1 for Rust allows unquoted and unescaped instances of the { and \xa0 characters, which may facilitate command injection.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

The shlex crate before 1.2.1 for Rust fails to escape the { and \xa0 characters, allowing unquoted instances that can lead to command injection when output is passed to a shell.

Vulnerability

The shlex crate for Rust, versions prior to 1.2.1, fails to properly quote or escape the { (curly brace) and \xa0 (non-breaking space) bytes when producing shell command arguments via the quote or join APIs [1][2]. These characters can appear unquoted and unescaped in the output, which may be misinterpreted by a shell [3]. Specifically, { is significant for glob expansion, and \xa0 is treated as a word separator in certain environments [3].

Exploitation

If an application uses shlex::quote or shlex::join to construct a command string that is subsequently passed to a shell (e.g., via sh -c or similar), an attacker who controls part of the input may inject these unquoted characters. This does not directly allow arbitrary command injection, but it can cause a single intended argument to be split into multiple arguments [3]. Depending on the command being run, this argument splitting may lead to undesired behavior and, in some cases, could enable arbitrary command execution [3].

Impact

A successful exploit could allow an attacker to alter the interpretation of a command, potentially leading to execution of unintended commands or malicious operations [2][3]. The vulnerability is classified as a code execution and file disclosure risk by the RustSec advisory [2].

Mitigation

The flaw is addressed starting in version 1.2.1, which adds escaping for the { and \xa0 bytes [3]. The maintainers recommend updating to version 1.3.0, which also deprecates the original quote and join APIs in favor of try_quote and try_join, which return an error on null bytes [2][3]. A workaround is to manually check for these characters in input or output strings [2][3].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
shlexcrates.io
< 1.3.01.3.0

Affected products

2
  • Rust/shlexllm-create
    Range: < 1.2.1
  • comex/shlexv5
    Range: 0

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.