CVE-2026-24516
Description
A command injection vulnerability exists in DigitalOcean Droplet Agent through 1.3.2. The troubleshooting actioner component (internal/troubleshooting/actioner/actioner.go) processes metadata from the metadata service endpoint and executes commands specified in the TroubleshootingAgent.Requesting array without adequate input validation. While the code validates that artifacts exist in the validInvestigationArtifacts map, it fails to sanitize the actual command content after the "command:" prefix. This allows an attacker who can control metadata responses to inject and execute arbitrary OS commands with root privileges. The attack is triggered by sending a TCP packet with specific sequence numbers to the SSH port, which causes the agent to fetch metadata from http://169.254.169.254/metadata/v1.json. The vulnerability affects the command execution flow in internal/troubleshooting/actioner/actioner.go (insufficient validation), internal/troubleshooting/command/exec.go (direct exec.CommandContext call), and internal/troubleshooting/command/command.go (command parsing without sanitization). This can lead to complete system compromise, data exfiltration, privilege escalation, and potential lateral movement across cloud infrastructure.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Command injection in DigitalOcean Droplet Agent allows attackers to execute arbitrary OS commands with root privileges by sending a crafted TCP packet to the SSH port.
A command injection vulnerability exists in the DigitalOcean Droplet Agent through version 1.3.2. The troubleshooting actioner component (internal/troubleshooting/actioner/actioner.go) processes metadata from the metadata service endpoint and executes commands specified in the TroubleshootingAgent.Requesting array. While the code validates that artifact keys exist in the validInvestigationArtifacts map, it fails to sanitize the command content after the "command:" prefix, allowing injection of arbitrary OS commands [1][4].
To exploit, an attacker sends a TCP packet with specific sequence numbers to the SSH port of a droplet running the agent. This triggers the agent to fetch metadata from http://169.254.169.254/metadata/v1.json. If the attacker can control the metadata response (e.g., via ARP spoofing on the local network), they can inject malicious commands that are then executed with root privileges [1]. The vulnerability exists across multiple files: actioner.go (insufficient validation), internal/troubleshooting/command/exec.go (direct exec.CommandContext call), and internal/troubleshooting/command/command.go (command parsing without sanitization) [3][4].
Successful exploitation results in arbitrary command execution as root, enabling full system compromise, data exfiltration, privilege escalation, and potential lateral movement across cloud infrastructure [1]. The Droplet Agent is a daemon that runs on customer droplets to enable features like web console access, affecting numerous DigitalOcean users [2].
DigitalOcean has addressed this vulnerability in versions after 1.3.2. Users are strongly advised to update the Droplet Agent to the latest version. If immediate patching is not possible, network segmentation and strict monitoring of metadata service requests can serve as temporary mitigations.
- NVD - CVE-2026-24516
- GitHub - digitalocean/droplet-agent: Droplet Agent is the daemon that runs on customer droplets to enable some features such as web console access.
- droplet-agent/internal/troubleshooting/command/command.go at main · digitalocean/droplet-agent
- droplet-agent/internal/troubleshooting/actioner/actioner.go at main · digitalocean/droplet-agent
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
github.com/digitalocean/droplet-agentGo | <= 0.0.0-20260107162243-1101ffcb5672 | — |
Affected products
1- DigitalOcean/Droplet Agentdescription
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/advisories/GHSA-fh3m-562m-w4f6ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-24516ghsaADVISORY
- github.com/digitalocean/droplet-agent/blob/main/internal/troubleshooting/actioner/actioner.goghsaWEB
- github.com/digitalocean/droplet-agent/blob/main/internal/troubleshooting/command/command.goghsaWEB
- github.com/digitalocean/droplet-agent/blob/main/internal/troubleshooting/command/exec.goghsaWEB
News mentions
0No linked articles in our index yet.