๐Ÿ” CVE Alert

CVE-2026-28207

MEDIUM 6.6

Zen-C Vulnerable to Command Injection via Malicious Output Filename

CVSS Score
6.6
EPSS Score
0.0%
EPSS Percentile
0th

Zen C is a systems programming language that compiles to human-readable GNU C/C11. Prior to version 0.4.2, a command injection vulnerability (CWE-78) in the Zen C compiler allows local attackers to execute arbitrary shell commands by providing a specially crafted output filename via the `-o` command-line argument. The vulnerability existed in the `main` application logic (specifically in `src/main.c`), where the compiler constructed a shell command string to invoke the backend C compiler. This command string was built by concatenating various arguments, including the user-controlled output filename, and was subsequently executed using the `system()` function. Because `system()` invokes a shell to parse and execute the command, shell metacharacters within the output filename were interpreted by the shell, leading to arbitrary command execution. An attacker who can influence the command-line arguments passed to the `zc` compiler (like through a build script or a CI/CD pipeline configuration) can execute arbitrary commands with the privileges of the user running the compiler. The vulnerability has been fixed in version 0.4.2 by removing `system()` calls, implementing `ArgList`, and internal argument handling. Users are advised to update to Zen C version v0.4.2 or later.

CWE CWE-78
Vendor z-libs
Product zen-c
Published Feb 26, 2026
Last Updated Mar 2, 2026
Stay Ahead of the Next One

Get instant alerts for z-libs zen-c

Be the first to know when new medium vulnerabilities affecting z-libs zen-c are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L
Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
Low
Integrity
High
Availability
Low

Affected Versions

z-libs / Zen-C
< 0.4.2

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/z-libs/Zen-C/security/advisories/GHSA-9rff-x96h-76h2 f0nduesav0yarde.github.io: https://f0nduesav0yarde.github.io/blog/vulnerabilities/cve-2026-28207/