๐Ÿ” CVE Alert

CVE-2026-33310

HIGH 8.8

Intake has a Command Injection via shell() Expansion in Parameter Defaults

CVSS Score
8.8
EPSS Score
0.0%
EPSS Percentile
0th

Intake is a package for finding, investigating, loading and disseminating data. Prior to version 2.0.9, the shell() syntax within parameter default values appears to be automatically expanded during the catalog parsing process. If a catalog contains a parameter default such as shell(<command>), the command may be executed when the catalog source is accessed. This means that if a user loads a malicious catalog YAML, embedded commands could execute on the host system. Version 2.0.9 mitigates the issue by making getshell False by default everywhere.

CWE CWE-78 CWE-94
Vendor intake
Product intake
Published Mar 24, 2026
Last Updated Mar 24, 2026
Stay Ahead of the Next One

Get instant alerts for intake intake

Be the first to know when new high vulnerabilities affecting intake intake are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Affected Versions

intake / intake
< 2.0.9

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/intake/intake/security/advisories/GHSA-37g4-qqqv-7m99 github.com: https://github.com/intake/intake/commit/d0c0b6b57c1cb3f73880655ded4a9b0e18e1fd1b