Impact
The vulnerability is an OS Command Injection in the command auto‑approval module of Axon Code. By exploiting a mismatch between the Unix‑based shell‑quote parser and the Windows command interpreter, attackers can craft inputs that bypass the whitelist check and trigger arbitrary commands. This gives attackers full control over the system, compromising confidentiality, integrity, and availability. The weakness is directly mapped to OS Command Injection (CWE‑78).
Affected Systems
The issue exists in the Axon Code auto‑approval module running on Windows. No specific vendor or product version list is provided; all deployments of this module prior to any available patch are potentially vulnerable.
Risk and Exploitability
The attack vector is inferred to be through the auto‑approval mechanism, likely requiring an attacker to submit a command or have access to a system that can upload commands. No EPSS score or CVSS score is supplied, but the nature of the exploitation—arbitrary command execution—suggests high severity. The vulnerability is not listed in the KEV catalog, yet it can be exploited by anyone who can influence the auto‑approval input. The ability to bypass a whitelist signifies a severe breach of intended security controls.
OpenCVE Enrichment