Description
A vulnerability was found in bastillion-io Bastillion up to 4.0.1. This issue affects some unknown processing of the file src/main/java/io/bastillion/manage/control/SystemKtrl.java of the component System Management Module. Performing a manipulation results in command injection. The attack can be initiated remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-01-17
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote command execution
Action: Patch Immediately
AI Analysis

Impact

A command injection vulnerability exists in Bastillion's SystemKtrl.java module. Unvalidated input can cause the application to execute arbitrary system commands on the host, potentially leading to full compromise of the underlying operating system, loss of confidentiality, integrity, and availability. The flaw is mapped to CWE‑74 and CWE‑77.

Affected Systems

The affected product is Bastillion System Management System released by bastillion‑io. Versions up to and including 4.0.1 contain the flaw. The issue resides in the System Management Module, specifically the src/main/java/io/bastillion/manage/control/SystemKtrl.java file. No other versions or components are known to be impacted.

Risk and Exploitability

The CVSS base score is 5.1, indicating moderate risk. EPSS is below 1 % and the vulnerability is not listed in the CISA KEV catalog, suggesting a low probability of widespread exploitation. However, the description confirms that the flaw can be triggered remotely and a public exploit exists, indicating potential immediate threat if the system is exposed to untrusted networks. Attackers would start by sending a crafted request to the vulnerable endpoint, and the lack of proper input validation would allow arbitrary commands to be executed on the host.

Generated by OpenCVE AI on April 18, 2026 at 05:32 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Restrict external access to the Bastillion management interface by placing it behind a firewall or VPN to prevent unauthenticated or remote exploitation.
  • Apply the latest vendor patch or upgrade Bastillion to a version newer than 4.0.1 once available to eliminate the vulnerable code path.
  • Consider disabling or removing the SystemKtrl endpoint or the entire System Management Module if it is not required for your environment.
  • Implement strong input validation or a whitelist of acceptable command parameters to mitigate injection risk if a patch is delayed.

Generated by OpenCVE AI on April 18, 2026 at 05:32 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 20 Jan 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 19 Jan 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Bastillion-io
Bastillion-io bastillion
Vendors & Products Bastillion-io
Bastillion-io bastillion

Sat, 17 Jan 2026 20:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in bastillion-io Bastillion up to 4.0.1. This issue affects some unknown processing of the file src/main/java/io/bastillion/manage/control/SystemKtrl.java of the component System Management Module. Performing a manipulation results in command injection. The attack can be initiated remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title bastillion-io Bastillion System Management SystemKtrl.java command injection
Weaknesses CWE-74
CWE-77
References
Metrics cvssV2_0

{'score': 5.8, 'vector': 'AV:N/AC:L/Au:M/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 4.7, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 4.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Bastillion-io Bastillion
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T08:34:26.430Z

Reserved: 2026-01-16T19:14:43.492Z

Link: CVE-2026-1064

cve-icon Vulnrichment

Updated: 2026-01-20T18:12:51.777Z

cve-icon NVD

Status : Deferred

Published: 2026-01-17T21:15:49.693

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-1064

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T05:45:38Z

Weaknesses