FKIE_CVE-2026-26009
Vulnerability from fkie_nvd - Published: 2026-02-10 19:16 - Updated: 2026-02-10 21:51
Severity ?
Summary
Catalyst is a platform built for enterprise game server hosts, game communities, and billing panel integrations. Install scripts defined in server templates execute directly on the host operating system as root via bash -c, with no sandboxing or containerization. Any user with template.create or template.update permission can define arbitrary shell commands that achieve full root-level remote code execution on every node machine in the cluster. This vulnerability is fixed in commit 11980aaf3f46315b02777f325ba02c56b110165d.
References
Impacted products
| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Catalyst is a platform built for enterprise game server hosts, game communities, and billing panel integrations. Install scripts defined in server templates execute directly on the host operating system as root via bash -c, with no sandboxing or containerization. Any user with template.create or template.update permission can define arbitrary shell commands that achieve full root-level remote code execution on every node machine in the cluster. This vulnerability is fixed in commit 11980aaf3f46315b02777f325ba02c56b110165d."
},
{
"lang": "es",
"value": "Catalyst es una plataforma construida para anfitriones de servidores de juegos empresariales, comunidades de juegos e integraciones de paneles de facturaci\u00f3n. Los scripts de instalaci\u00f3n definidos en las plantillas de servidor se ejecutan directamente en el sistema operativo anfitri\u00f3n como root a trav\u00e9s de bash -c, sin sandboxing ni contenerizaci\u00f3n. Cualquier usuario con permiso template.create o template.update puede definir comandos de shell arbitrarios que logran la ejecuci\u00f3n remota de c\u00f3digo de nivel root completo en cada m\u00e1quina nodo del cl\u00faster. Esta vulnerabilidad se corrige en el commit 11980aaf3f46315b02777f325ba02c56b110165d."
}
],
"id": "CVE-2026-26009",
"lastModified": "2026-02-10T21:51:48.077",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.9,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.1,
"impactScore": 6.0,
"source": "security-advisories@github.com",
"type": "Secondary"
}
]
},
"published": "2026-02-10T19:16:04.437",
"references": [
{
"source": "security-advisories@github.com",
"url": "https://github.com/karutoil/catalyst/commit/11980aaf3f46315b02777f325ba02c56b110165d"
},
{
"source": "security-advisories@github.com",
"url": "https://github.com/karutoil/catalyst/security/advisories/GHSA-xv5r-cpcw-8wr3"
}
],
"sourceIdentifier": "security-advisories@github.com",
"vulnStatus": "Awaiting Analysis",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-78"
}
],
"source": "security-advisories@github.com",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…