CVE-2026-35581
Emissary has a Command Injection via PLACE_NAME Configuration in Executrix
CVSS Score
7.2
EPSS Score
0.1%
EPSS Percentile
18th
Emissary is a P2P based data-driven workflow engine. Prior to 8.39.0, the Executrix utility class constructed shell commands by concatenating configuration-derived values โ including the PLACE_NAME parameter โ with insufficient sanitization. Only spaces were replaced with underscores, allowing shell metacharacters (;, |, $, `, (, ), etc.) to pass through into /bin/sh -c command execution. This vulnerability is fixed in 8.39.0.
| CWE | CWE-78 |
| Vendor | nationalsecurityagency |
| Product | emissary |
| Published | Apr 7, 2026 |
| Last Updated | Apr 8, 2026 |
Stay Ahead of the Next One
Get instant alerts for nationalsecurityagency emissary
Be the first to know when new high vulnerabilities affecting nationalsecurityagency emissary are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Affected Versions
NationalSecurityAgency / emissary
< 8.39.0