Description
ngrok v4.3.3 and 5.0.0-beta.2 is vulnerable to Command Injection.
Published: 2026-05-18
Score: 8.8 High
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

ngrok versions 4.3.3 and 5.0.0-beta.2 contain a command injection flaw that allows an attacker to run arbitrary operating‑system commands with the privileges of the ngrok process. This weakness can lead to full compromise of confidentiality, integrity, and availability of the host system. The vulnerability is a classic OS command‑injection flaw, referenced by CWE-77, and is triggered when untrusted input is improperly handled by ngrok internally.

Affected Systems

The affected products are ngrok 4.3.3 and 5.0.0-beta.2. No other vendor or product information is documented. Users running these specific releases should verify their version and evaluate exposure.

Risk and Exploitability

No EPSS score is reported and the vulnerability is not listed in the CISA KEV catalog, indicating no known public exploitation. The CVSS score of 8.8 highlights a high severity. Based on the description, it is inferred that the likely attack vector is a remotely exploitable endpoint exposed by ngrok when it processes untrusted input. If an attacker can interact with the vulnerable service, they can achieve remote code execution by injecting malicious commands.

Generated by OpenCVE AI on May 18, 2026 at 21:23 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade ngrok to a newer stable release that removes the injection vector, preferably a release newer than 4.3.3 and 5.0.0-beta.2.
  • Restrict network access to the ngrok service by configuring firewall rules or VPNs so that only trusted hosts can reach the exposed endpoints.
  • Implement runtime monitoring of ngrok logs and network traffic to detect abnormal command execution or unexpected API activity, enabling early detection of any attempted exploitation.

Generated by OpenCVE AI on May 18, 2026 at 21:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 18 May 2026 20:45:00 +0000

Type Values Removed Values Added
Title Command Injection in ngrok 4.3.3 and 5.0.0-beta.2
Weaknesses CWE-78

Mon, 18 May 2026 18:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-77
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 18 May 2026 16:45:00 +0000

Type Values Removed Values Added
Title Command Injection in ngrok 4.3.3 and 5.0.0-beta.2
Weaknesses CWE-78

Mon, 18 May 2026 15:30:00 +0000

Type Values Removed Values Added
Description ngrok v4.3.3 and 5.0.0-beta.2 is vulnerable to Command Injection.
References

Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-05-18T17:23:14.945Z

Reserved: 2025-08-17T00:00:00.000Z

Link: CVE-2025-57282

cve-icon Vulnrichment

Updated: 2026-05-18T17:19:57.519Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-18T16:16:29.253

Modified: 2026-05-18T20:27:12.817

Link: CVE-2025-57282

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-18T21:30:15Z

Weaknesses