Description
Versions of the package nemo-appium before 0.0.9 are vulnerable to Command Injection due to improper input sanitization in the 'module.exports.setup' function.


**Note:** In order to exploit this vulnerability appium-running 0.1.3 has to be installed as one of nemo-appium dependencies.

Published: 2023-01-31
Score: 7.4 High
EPSS: 1.1% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2023-0439 nemo-appium vulnerable to OS Command Injection
Github GHSA Github GHSA GHSA-c6rx-gxqv-vr5j nemo-appium vulnerable to OS Command Injection
History

Sat, 12 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.01354}

epss

{'score': 0.0157}


Thu, 27 Mar 2025 18:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-77
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Subscriptions

Paypal Nemo-appium
cve-icon MITRE

Status: PUBLISHED

Assigner: snyk

Published:

Updated: 2025-03-27T17:15:46.697Z

Reserved: 2022-02-24T11:58:26.952Z

Link: CVE-2022-21129

cve-icon Vulnrichment

Updated: 2024-08-03T02:31:59.643Z

cve-icon NVD

Status : Modified

Published: 2023-01-31T05:15:11.060

Modified: 2025-03-27T18:15:19.120

Link: CVE-2022-21129

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.