Description
Natro Macro is an open-source Bee Swarm Simulator macro written in AutoHotkey. Prior to version 1.1.0, any ahk code contained inside of a pattern or path file is executed by the macro. Since users commonly share path/pattern files, an attacker could share a file containing malicious code, which is then executed by the program. This code can operate in silence alongside the pattern, running in the background to do whatever the attacker pleases. This issue has been patched in version 1.1.0.
Published: 2026-03-06
Score: 6.6 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Code Injection allowing arbitrary code execution within a user’s system
Action: Immediate Patch
AI Analysis

Impact

NatroMacro, an open‑source AutoHotkey macro for Bee Swarm Simulator, executed any AHK code embedded in pattern or path files prior to version 1.1.0. A malicious actor can craft a shared file that contains executable code; when the macro loads the file, the code runs silently in the background, enabling the attacker to perform any action the macro has permission to execute. This vulnerability is a classic instance of code injection and its impact enables full control of the host system, compromising confidentiality, integrity, and availability.

Affected Systems

All installations of NatroTeam NatroMacro running a version earlier than 1.1.0 that permit automatic loading of pattern and path files from shared locations. The known affected vendor/product combination is NatroTeam NatroMacro, as documented by the CNA, with the affected version range spanning all releases before 1.1.0.

Risk and Exploitability

The CVSS base score of 6.6 indicates moderate severity, and the EPSS score of less than 1% suggests low exploitation likelihood under current conditions. The vulnerability is not listed in CISA’s KEV catalog, implying no publicly confirmed, large‑scale exploitation. Exploitation requires a user to run NatroMacro with an untrusted pattern or path file; once executed, the macro has full access to the user’s machine. Consequently the risk is elevated for environments where users regularly share or ingest such files, and mitigation actions should be prioritized to avoid potential compromise.

Generated by OpenCVE AI on April 16, 2026 at 11:30 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update NatroMacro to version 1.1.0 or later to eliminate the code‑injection flaw.
  • Avoid loading pattern or path files from untrusted or unknown sources; only use files from verified origins.
  • If an update cannot be applied immediately, disable the macro’s automatic execution of embedded AHK code by removing or sanitizing script sections within pattern/path files.

Generated by OpenCVE AI on April 16, 2026 at 11:30 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 10 Mar 2026 19:45:00 +0000

Type Values Removed Values Added
First Time appeared Natroteam natro Macro
CPEs cpe:2.3:a:natroteam:natro_macro:*:*:*:*:*:*:*:*
Vendors & Products Natroteam natro Macro

Mon, 09 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Natroteam
Natroteam natromacro
Vendors & Products Natroteam
Natroteam natromacro

Fri, 06 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 06 Mar 2026 07:00:00 +0000

Type Values Removed Values Added
Description Natro Macro is an open-source Bee Swarm Simulator macro written in AutoHotkey. Prior to version 1.1.0, any ahk code contained inside of a pattern or path file is executed by the macro. Since users commonly share path/pattern files, an attacker could share a file containing malicious code, which is then executed by the program. This code can operate in silence alongside the pattern, running in the background to do whatever the attacker pleases. This issue has been patched in version 1.1.0.
Title Natro Macro: Code Injection through Pattern/Path files
Weaknesses CWE-94
References
Metrics cvssV3_1

{'score': 6.6, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N'}


Subscriptions

Natroteam Natro Macro Natromacro
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-06T16:05:46.248Z

Reserved: 2026-03-03T14:25:19.246Z

Link: CVE-2026-28801

cve-icon Vulnrichment

Updated: 2026-03-06T15:58:10.432Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-06T07:16:00.883

Modified: 2026-03-10T19:41:21.233

Link: CVE-2026-28801

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T11:45:26Z

Weaknesses