org-babel-execute:latex in ob-latex.el in Org Mode through 9.6.1 for GNU Emacs allows attackers to execute arbitrary commands via a file name or directory name that contains shell metacharacters.

Project Subscriptions

Vendors Products
Org Mode Subscribe
Enterprise Linux Subscribe
Rhel Aus Subscribe
Rhel E4s Subscribe
Rhel Eus Subscribe
Rhel Tus Subscribe
Advisories
Source ID Title
Debian DLA Debian DLA DLA-3416-1 emacs security update
Debian DLA Debian DLA DLA-3616-1 org-mode security update
Debian DLA Debian DLA DLA-4069-1 emacs security update
EUVD EUVD EUVD-2023-32285 org-babel-execute:latex in ob-latex.el in Org Mode through 9.6.1 for GNU Emacs allows attackers to execute arbitrary commands via a file name or directory name that contains shell metacharacters.
Ubuntu USN Ubuntu USN USN-6003-1 Emacs vulnerability
Ubuntu USN Ubuntu USN USN-7027-1 Emacs vulnerabilities
Ubuntu USN Ubuntu USN USN-7375-1 Org Mode vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 03 Nov 2025 21:30:00 +0000

Type Values Removed Values Added
References

Tue, 04 Mar 2025 03:45:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-11-03T20:35:28.705Z

Reserved: 2023-03-19T00:00:00.000Z

Link: CVE-2023-28617

cve-icon Vulnrichment

Updated: 2025-11-03T20:35:28.705Z

cve-icon NVD

Status : Modified

Published: 2023-03-19T03:15:11.747

Modified: 2025-11-03T21:15:57.010

Link: CVE-2023-28617

cve-icon Redhat

Severity : Important

Publid Date: 2023-03-19T00:00:00Z

Links: CVE-2023-28617 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses