VYPR
High severity7.2NVD Advisory· Published Apr 7, 2026· Updated Apr 16, 2026

CVE-2026-35581

CVE-2026-35581

Description

Emissary is a P2P based data-driven workflow engine. Prior to 8.39.0, the Executrix utility class constructed shell commands by concatenating configuration-derived values — including the PLACE_NAME parameter — with insufficient sanitization. Only spaces were replaced with underscores, allowing shell metacharacters (;, |, $, `, (, ), etc.) to pass through into /bin/sh -c command execution. This vulnerability is fixed in 8.39.0.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
gov.nsa.emissary:emissaryMaven
< 8.39.08.39.0

Affected products

1
  • cpe:2.3:a:nsa:emissary:*:*:*:*:*:*:*:*
    Range: <=8.38.0

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

1