VYPR
High severityNVD Advisory· Published Mar 23, 2026· Updated Mar 24, 2026

CVE-2026-24516

CVE-2026-24516

Description

A command injection vulnerability exists in DigitalOcean Droplet Agent through 1.3.2. The troubleshooting actioner component (internal/troubleshooting/actioner/actioner.go) processes metadata from the metadata service endpoint and executes commands specified in the TroubleshootingAgent.Requesting array without adequate input validation. While the code validates that artifacts exist in the validInvestigationArtifacts map, it fails to sanitize the actual command content after the "command:" prefix. This allows an attacker who can control metadata responses to inject and execute arbitrary OS commands with root privileges. The attack is triggered by sending a TCP packet with specific sequence numbers to the SSH port, which causes the agent to fetch metadata from http://169.254.169.254/metadata/v1.json. The vulnerability affects the command execution flow in internal/troubleshooting/actioner/actioner.go (insufficient validation), internal/troubleshooting/command/exec.go (direct exec.CommandContext call), and internal/troubleshooting/command/command.go (command parsing without sanitization). This can lead to complete system compromise, data exfiltration, privilege escalation, and potential lateral movement across cloud infrastructure.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Command injection in DigitalOcean Droplet Agent allows attackers to execute arbitrary OS commands with root privileges by sending a crafted TCP packet to the SSH port.

A command injection vulnerability exists in the DigitalOcean Droplet Agent through version 1.3.2. The troubleshooting actioner component (internal/troubleshooting/actioner/actioner.go) processes metadata from the metadata service endpoint and executes commands specified in the TroubleshootingAgent.Requesting array. While the code validates that artifact keys exist in the validInvestigationArtifacts map, it fails to sanitize the command content after the "command:" prefix, allowing injection of arbitrary OS commands [1][4].

To exploit, an attacker sends a TCP packet with specific sequence numbers to the SSH port of a droplet running the agent. This triggers the agent to fetch metadata from http://169.254.169.254/metadata/v1.json. If the attacker can control the metadata response (e.g., via ARP spoofing on the local network), they can inject malicious commands that are then executed with root privileges [1]. The vulnerability exists across multiple files: actioner.go (insufficient validation), internal/troubleshooting/command/exec.go (direct exec.CommandContext call), and internal/troubleshooting/command/command.go (command parsing without sanitization) [3][4].

Successful exploitation results in arbitrary command execution as root, enabling full system compromise, data exfiltration, privilege escalation, and potential lateral movement across cloud infrastructure [1]. The Droplet Agent is a daemon that runs on customer droplets to enable features like web console access, affecting numerous DigitalOcean users [2].

DigitalOcean has addressed this vulnerability in versions after 1.3.2. Users are strongly advised to update the Droplet Agent to the latest version. If immediate patching is not possible, network segmentation and strict monitoring of metadata service requests can serve as temporary mitigations.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
github.com/digitalocean/droplet-agentGo
<= 0.0.0-20260107162243-1101ffcb5672

Affected products

1
  • DigitalOcean/Droplet Agentdescription

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.