Impact
The Syntx auto‑approval module relies on fragile regular expressions to whitelist command structures, but it does not filter standard shell substitution syntax such as $(…) or backticks. An attacker can craft a command like git log --grep="$(malicious_command)" that the module mistakenly treats as a safe Git operation and automatically approves it. The underlying shell then executes the injected code, giving the attacker arbitrary execution privileges on the host. This flaw is a classic command injection vulnerability, classified as CWE‑94, and leads to complete compromise of confidentiality, integrity and availability of the affected system.
Affected Systems
The vulnerability is present in the Syntx application from OrangeCat, as identified by the corresponding CPE. All releases that include the auto‑approval command module are potentially affected; specific version information is not provided, so any Syntx deployment should be considered at risk until verified otherwise.
Risk and Exploitability
With a CVSS score of 9.8 the flaw is considered catastrophic, enabling attackers to gain system‑level control. The EPSS score of less than 1% suggests that widespread exploitation is currently low, but the high severity and lack of a KEV listing do not mitigate the potential for targeted attacks. Exploitation likely occurs by submitting maliciously crafted commands to the auto‑approval interface, causing the shell to execute the payload without user interaction. The impact would be uncontrolled remote code execution.
OpenCVE Enrichment