Impact
The theshit command‑line utility contains a flaw where privilege dropping is handled incorrectly. When a user runs the tool with elevated rights, the utility may re‑execute commands without properly relinquishing those privileges, enabling an attacker who can exercise local control over the system to gain higher privileges. The weakness is manifested as an improper elevation of privilege and violates the principle of least privilege, as captured by CWE‑250, CWE‑269 and CWE‑273.
Affected Systems
The vulnerability affects the theshit utility developed by AsfhtgkDavid. Any installation running a version earlier than 0.2.0 is susceptible; the problem was resolved in the 0.2.0 release.
Risk and Exploitability
The CVSS score of 8.4 indicates a high severity vulnerability, while the EPSS score of less than 1% suggests that public exploitation is unlikely but it remains a plausible threat vector for local attackers. The vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog, but the potential for local privilege escalation makes it a high‑risk asset for systems that allow users to run the utility with elevated rights. The most straightforward exploitation path involves an attacker who can execute shell commands or scripts on the host and re‑invoke the utility under an elevated context, thereby acquiring additional privileges.
OpenCVE Enrichment
Github GHSA