Impact
The vulnerability involves an OS Command Injection in the auto‑approval module of MatterAI Axon Code. The flaw arises from the use of a Unix‑based shell‑quote library on a Windows platform without correctly handling Windows CMD escape sequences. Attackers can craft payloads that deceive the parser, bypass the whitelist system, and have the Windows shell execute arbitrary commands, resulting in Remote Code Execution.
Affected Systems
MatterAI Axon Code is affected. Any deployment that includes the auto‑approval feature before a vendor fix is vulnerable. No specific version information was provided, so all installations using this module are potentially at risk.
Risk and Exploitability
The issue has a CVSS score of 9.8, indicating a very high severity. The EPSS score is below 1 % and it is not listed in the CISA KEV catalog, suggesting a lower likelihood of immediate exploitation. The likely attack vector involves access to the interface that accepts Git commands; admitted or compromised users could submit malicious payloads such as "git log ^\"& malicious_command ^\"", which would be executed under the application's privileges.
OpenCVE Enrichment