CVE-2026-0933

Severity CVSS v4.0:
HIGH
Type:
CWE-20 Input Validation
Publication date:
20/01/2026
Last modified:
20/01/2026

Description

SummaryA command injection vulnerability (CWE-78) has been found to exist in the `wrangler pages deploy` command. The issue occurs because the `--commit-hash` parameter is passed directly to a shell command without proper validation or sanitization, allowing an attacker with control of `--commit-hash` to execute arbitrary commands on the system running Wrangler.<br /> <br /> <br /> <br /> <br /> Root causeThe commitHash variable, derived from user input via the --commit-hash CLI argument, is interpolated directly into a shell command using template literals (e.g.,  execSync(`git show -s --format=%B ${commitHash}`)). Shell metacharacters are interpreted by the shell, enabling command execution.<br /> <br /> <br /> <br /> <br /> ImpactThis vulnerability is generally hard to exploit, as it requires --commit-hash to be attacker controlled. The vulnerability primarily affects CI/CD environments where `wrangler pages deploy` is used in automated pipelines and the <br /> <br /> --commit-hash parameter is populated from external, potentially untrusted sources. An attacker could exploit this to:<br /> <br /> * Run any shell command.<br /> * Exfiltrate environment variables.<br /> * Compromise the CI runner to install backdoors or modify build artifacts.<br /> <br /> <br /> <br /> Credits Disclosed responsibly by kny4hacker.<br /> <br /> <br /> <br /> <br /> Mitigation<br /> * Wrangler v4 users are requested to upgrade to Wrangler v4.59.1 or higher.<br /> * Wrangler v3 users are requested to upgrade to Wrangler v3.114.17 or higher.<br /> * Users on Wrangler v2 (EOL) should upgrade to a supported major version.

References to Advisories, Solutions, and Tools