Impact
A remote OS command injection flaw exists in the TTS provider's promise function for mac‑os.js in the node‑sonos‑http‑api project. The vulnerability allows an attacker to supply crafted input as the phrase argument, causing arbitrary shell commands to be executed on the host. The injected commands can alter system state, exfiltrate data, or compromise the server, leading to full compromise of confidentiality, integrity and availability.
Affected Systems
The flaw affects all deployments of the jishi node‑sonos‑http‑api package prior to the unknown fix commit 3776f0ee2261c924c7b7204de121a38100a08ca7. Because the project follows a rolling release cycle, specific version numbers are absent, but any instance built from sources before the patch is vulnerable.
Risk and Exploitability
With a CVSS score of 6.9, the vulnerability is considered medium to high severity. The EPSS score of less than 1% indicates a low current exploitation probability, and the vulnerability is not listed in the CISA KEV catalog. An attacker must be able to reach the TTS provider over the network for remote exploitation, which is plausible if the service is exposed to the internet or accessible from an attacker’s internal network.
OpenCVE Enrichment