CVE-2026-42453
Termix: Command injection in extractArchive/compressFiles via double-quote escaping bypass
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
Termix is a web-based server management platform with SSH terminal, tunneling, and file editing capabilities. Prior to version 2.1.0, the extractArchive and compressFiles endpoints in file-manager.ts use double-quoted strings for shell command construction, unlike all other file manager operations which use single-quote escaping. Double quotes allow $(command) substitution, enabling command injection on the remote SSH host. This issue has been patched in version 2.1.0.
| CWE | CWE-77 |
| Vendor | termix-ssh |
| Product | termix |
| Published | May 8, 2026 |
Stay Ahead of the Next One
Get instant alerts for termix-ssh termix
Be the first to know when new unknown vulnerabilities affecting termix-ssh termix are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Termix-SSH / Termix
< 2.1.0