VYPR
High severity8.8NVD Advisory· Published May 18, 2026· Updated May 18, 2026

CVE-2025-57282

CVE-2025-57282

Description

ngrok v4.3.3 and 5.0.0-beta.2 is vulnerable to Command Injection.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A command injection vulnerability in ngrok v4.3.3 and 5.0.0-beta.2 allows arbitrary commands to be executed during binary path resolution via the ngrok.getVersion API.

Root

Cause

The ngrok npm package versions 4.3.3 and 5.0.0-beta.2 contain a command injection flaw. The vulnerability stems from the getVersion() function, which accepts a binPath option expected to be a function returning a file path. An attacker can supply a maliciously crafted binPath to return arbitrary shell commands instead of a path, enabling code execution [1].

Attack

Vector

Exploitation requires the ability to pass a specially crafted options object to ngrok.getVersion(). The proof-of-concept demonstrates that by setting binPath to a function that returns something like "touch Dremig486; #", the injected shell command is executed when the library resolves the binary path. No authentication is needed; any application or script that uses the vulnerable ngrok API with attacker-controlled options is exposed [1].

Impact

Impact

A successful injection allows the attacker to execute arbitrary commands in the context of the Node.js process running the ngrok package. This can lead to file creation, data exfiltration, privilege escalation, or further compromise of the host system. The PoC specifically shows creating a file in the current directory, but the impact extends to any shell command [1].

Mitigation

Status

As of the publication date, no official patch has been released. The vulnerability affects both the latest stable channel version (4.3.3) and the beta version (5.0.0-beta.2). Users should avoid passing untrusted input to the getVersion() function's options and monitor upstream for a fixed release that fixes the injection [1

References
  1. CVE-2025-57282

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.