CVE-2026-0933
Severity CVSS v4.0:
HIGH
Type:
CWE-20
Input Validation
Publication date:
20/01/2026
Last modified:
20/01/2026
Description
SummaryA command injection vulnerability (CWE-78) has been found to exist in the `wrangler pages deploy` command. The issue occurs because the `--commit-hash` parameter is passed directly to a shell command without proper validation or sanitization, allowing an attacker with control of `--commit-hash` to execute arbitrary commands on the system running Wrangler.<br />
<br />
<br />
<br />
<br />
Root causeThe commitHash variable, derived from user input via the --commit-hash CLI argument, is interpolated directly into a shell command using template literals (e.g., execSync(`git show -s --format=%B ${commitHash}`)). Shell metacharacters are interpreted by the shell, enabling command execution.<br />
<br />
<br />
<br />
<br />
ImpactThis vulnerability is generally hard to exploit, as it requires --commit-hash to be attacker controlled. The vulnerability primarily affects CI/CD environments where `wrangler pages deploy` is used in automated pipelines and the <br />
<br />
--commit-hash parameter is populated from external, potentially untrusted sources. An attacker could exploit this to:<br />
<br />
* Run any shell command.<br />
* Exfiltrate environment variables.<br />
* Compromise the CI runner to install backdoors or modify build artifacts.<br />
<br />
<br />
<br />
Credits Disclosed responsibly by kny4hacker.<br />
<br />
<br />
<br />
<br />
Mitigation<br />
* Wrangler v4 users are requested to upgrade to Wrangler v4.59.1 or higher.<br />
* Wrangler v3 users are requested to upgrade to Wrangler v3.114.17 or higher.<br />
* Users on Wrangler v2 (EOL) should upgrade to a supported major version.
Impact
Base Score 4.0
7.70
Severity 4.0
HIGH



