Description
Catalyst is a platform built for enterprise game server hosts, game communities, and billing panel integrations. Install scripts defined in server templates execute directly on the host operating system as root via bash -c, with no sandboxing or containerization. Any user with template.create or template.update permission can define arbitrary shell commands that achieve full root-level remote code execution on every node machine in the cluster. This vulnerability is fixed in commit 11980aaf3f46315b02777f325ba02c56b110165d.
Published: 2026-02-10
Score: 10 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution as Root
Action: Apply Patch
AI Analysis

Impact

Catalyst permits users with template.create or template.update permissions to inject arbitrary shell commands directly into the host operating system via bash –c. Because the install scripts run with root privileges and lack any sandboxing, an attacker can execute any command on every node in the cluster, achieving full root-level compromise. This flaw corresponds to CWE‑78, giving attackers both confidentiality and integrity breaches and the ability to modify or delete data, disrupt services, or pivot to other network resources.

Affected Systems

The vulnerable product is Karutoil Catalyst, a platform for enterprise game server hosting and related operations. All builds released prior to the security commit identified as 11980aaf3f46315b02777f325ba02c56b110165d are affected, regardless of specific version numbers. The vulnerability remains present as long as template scripts continue to execute with elevated privileges on cluster nodes.

Risk and Exploitability

The CVSS base score of 10 indicates critical severity, while the EPSS score below 1% suggests that exploitation is currently rare, likely due to the need for privileged template creation or update rights. The attack surface is limited to users who can manage templates, but once such a role is compromised, an attacker can obtain unrestricted root access across all nodes. This vulnerability is not listed in the CISA KEV catalog yet, indicating that no known active exploitation has been reported at this time. The primary attack vector is inferred to be the privileged template creation or update process, which allows arbitrary shell code to be injected and executed with root privileges on the host operating system.

Generated by OpenCVE AI on April 17, 2026 at 20:28 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the security fix by updating the Catalyst repository to commit 11980aaf3f46315b02777f325ba02c56b110165d or any downstream release that incorporates this change.
  • Restrict the template.create and template.update permissions to a minimal set of trusted administrators and remove or limit these rights for untrusted users.
  • Deploy a container or sandboxing mechanism for install scripts, ensuring that any future script execution does not inherit host root privileges.

Generated by OpenCVE AI on April 17, 2026 at 20:28 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 10 Feb 2026 21:45:00 +0000

Type Values Removed Values Added
First Time appeared Karutoil
Karutoil catalyst
Vendors & Products Karutoil
Karutoil catalyst

Tue, 10 Feb 2026 19:15:00 +0000

Type Values Removed Values Added
Description Catalyst is a platform built for enterprise game server hosts, game communities, and billing panel integrations. Install scripts defined in server templates execute directly on the host operating system as root via bash -c, with no sandboxing or containerization. Any user with template.create or template.update permission can define arbitrary shell commands that achieve full root-level remote code execution on every node machine in the cluster. This vulnerability is fixed in commit 11980aaf3f46315b02777f325ba02c56b110165d.
Title Catalyst Affected by Remote Code Execution as Root via Containerized Install Script Execution
Weaknesses CWE-78
References
Metrics cvssV3_1

{'score': 10, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Subscriptions

Karutoil Catalyst
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-02-10T19:10:21.719Z

Reserved: 2026-02-09T21:36:29.553Z

Link: CVE-2026-26009

cve-icon Vulnrichment

Updated: 2026-02-10T19:10:18.352Z

cve-icon NVD

Status : Deferred

Published: 2026-02-10T19:16:04.437

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-26009

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T20:30:15Z

Weaknesses