ByteDance Deer-Flow versions prior to commit 92c7a20 contain a sandbox escape vulnerability in bash tool handling that allows attackers to execute arbitrary commands on the host system by bypassing regex-based validation using shell features such as directory changes and relative paths. Attackers can exploit the incomplete shell semantics modeling to read and modify files outside the sandbox boundary and achieve arbitrary command execution through subprocess invocation with shell interpretation enabled.
Metrics
Affected Vendors & Products
References
History
Thu, 02 Apr 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Bytedance
Bytedance deerflow Deerflow Deerflow deerflow |
|
| Weaknesses | NVD-CWE-noinfo | |
| CPEs | cpe:2.3:a:deerflow:deerflow:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Bytedance
Bytedance deerflow Deerflow Deerflow deerflow |
Wed, 01 Apr 2026 23:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | ByteDance Deer-Flow versions prior to commit 92c7a20 contain a sandbox escape vulnerability in bash tool handling that allows attackers to execute arbitrary commands on the host system by bypassing regex-based validation using shell features such as directory changes and relative paths. Attackers can exploit the incomplete shell semantics modeling to read and modify files outside the sandbox boundary and achieve arbitrary command execution through subprocess invocation with shell interpretation enabled. | |
| Title | ByteDance DeerFlow LocalSandboxProvider Host Bash Escape | |
| Weaknesses | CWE-184 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published: 2026-04-01T13:34:17.014Z
Updated: 2026-04-01T15:01:25.156Z
Reserved: 2026-03-27T15:24:06.752Z
Link: CVE-2026-34430
Updated: 2026-04-01T14:53:17.031Z
Status : Analyzed
Published: 2026-04-01T14:16:52.773
Modified: 2026-04-02T19:41:55.973
Link: CVE-2026-34430
No data.