Impact
Catalyst permits users with template.create or template.update permissions to inject arbitrary shell commands directly into the host operating system via bash –c. Because the install scripts run with root privileges and lack any sandboxing, an attacker can execute any command on every node in the cluster, achieving full root-level compromise. This flaw corresponds to CWE‑78, giving attackers both confidentiality and integrity breaches and the ability to modify or delete data, disrupt services, or pivot to other network resources.
Affected Systems
The vulnerable product is Karutoil Catalyst, a platform for enterprise game server hosting and related operations. All builds released prior to the security commit identified as 11980aaf3f46315b02777f325ba02c56b110165d are affected, regardless of specific version numbers. The vulnerability remains present as long as template scripts continue to execute with elevated privileges on cluster nodes.
Risk and Exploitability
The CVSS base score of 10 indicates critical severity, while the EPSS score below 1% suggests that exploitation is currently rare, likely due to the need for privileged template creation or update rights. The attack surface is limited to users who can manage templates, but once such a role is compromised, an attacker can obtain unrestricted root access across all nodes. This vulnerability is not listed in the CISA KEV catalog yet, indicating that no known active exploitation has been reported at this time. The primary attack vector is inferred to be the privileged template creation or update process, which allows arbitrary shell code to be injected and executed with root privileges on the host operating system.
OpenCVE Enrichment