Description
A security vulnerability has been detected in HummerRisk up to 1.5.0. Affected by this issue is some unknown functionality of the file ResourceCreateService.java of the component Cloud Task Scheduler. Such manipulation of the argument regionId leads to command injection. The attack may be launched remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-02-24
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Command Injection
Action: Apply Patch
AI Analysis

Impact

A flaw in the Cloud Task Scheduler component of HummerRisk allows attackers to manipulate the regionId argument within ResourceCreateService.java, resulting in command injection that can execute arbitrary operating‑system commands on the host running the service. Defined by CWE‑74 and CWE‑77, the vulnerability could compromise confidentiality, integrity, and availability of the affected system if successfully exploited.

Affected Systems

The affected product is HummerRisk, versions up to and including 1.5.0. The flaw resides in the ResourceCreateService.java file of the Cloud Task Scheduler component, and no narrower sub‑product is defined; consequently, the entire HummerRisk application bundle is potentially impacted whenever the vulnerable version is in use.

Risk and Exploitability

The CVSS base score of 5.3 indicates moderate severity, while the EPSS score of less than 1 % points to a very low exploitation likelihood at the time of analysis. The vulnerability is not listed in the CISA KEV catalog. Attackers would need network access to the task‑scheduler endpoint and the ability to supply crafted regionId parameters, implying a remote exploit vector that can be launched over the network without local user interaction.

Generated by OpenCVE AI on April 18, 2026 at 10:58 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Restrict network access to the HummerRisk Cloud Task Scheduler API using firewall rules or VPN to limit exposure to trusted IP addresses.
  • Sanitize and validate the regionId input on the server side before incorporating it into any command execution, removing shell metacharacters or otherwise disallowing dangerous characters.
  • Enable detailed logging of command execution attempts and monitor these logs with intrusion detection systems to detect anomalous activity.
  • Upgrade HummerRisk to a release newer than 1.5.0 once a vendor patch is issued, thereby eliminating the known injection flaw.

Generated by OpenCVE AI on April 18, 2026 at 10:58 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 25 Feb 2026 12:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 24 Feb 2026 21:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:hummerrisk:hummerrisk:*:*:*:*:*:*:*:*

Tue, 24 Feb 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Hummerrisk
Hummerrisk hummerrisk
Vendors & Products Hummerrisk
Hummerrisk hummerrisk

Tue, 24 Feb 2026 03:00:00 +0000

Type Values Removed Values Added
Description A security vulnerability has been detected in HummerRisk up to 1.5.0. Affected by this issue is some unknown functionality of the file ResourceCreateService.java of the component Cloud Task Scheduler. Such manipulation of the argument regionId leads to command injection. The attack may be launched remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title HummerRisk Cloud Task Scheduler ResourceCreateService.java command injection
Weaknesses CWE-74
CWE-77
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Hummerrisk Hummerrisk
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-24T19:30:05.511Z

Reserved: 2026-02-23T18:50:55.689Z

Link: CVE-2026-3064

cve-icon Vulnrichment

Updated: 2026-02-24T19:26:11.643Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-24T03:16:03.427

Modified: 2026-02-24T21:05:33.127

Link: CVE-2026-3064

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T11:00:05Z

Weaknesses