Impact
DigitalOcean’s Droplet Agent (through version 1.3.2) contains a command injection flaw in its troubleshooting actioner component. The agent pulls metadata from 169.254.169.254/metadata/v1.json, parses a 'TroubleshootingAgent.Requesting' array, and executes the command portions without sanitizing the payload. Because the agent runs the commands as root, an attacker who can influence the metadata response can inject arbitrary operating‑system commands and gain full system control. The weakness is an unvalidated command execution (CWE‑94).
Affected Systems
The affected product is DigitalOcean Droplet Agent, version 1.3.2 and earlier. Any droplet running this agent is susceptible; newer releases beyond 1.3.2 are not currently known to be impacted.
Risk and Exploitability
The CVSS score is 8.8, representing a high‑severity vulnerability. The EPSS score is below 1 %, indicating a low probability of exploitation in the wild, and it is not listed in CISA’s KEV catalog. Exploitation requires network access sufficient to modify the metadata service response and to send a specially crafted TCP packet to the droplet’s SSH port, which triggers the agent’s metadata retrieval. If those conditions are met, the attacker can execute arbitrary commands with root privileges, potentially leading to full system compromise, data exfiltration, and lateral movement across a cloud environment.
OpenCVE Enrichment
Github GHSA