Description
A vulnerability was detected in HummerRisk up to 1.5.0. This affects the function CommandUtils.commonExecCmdWithResult of the file CloudTaskService.java of the component Cloud Task Dry-run. Performing a manipulation of the argument fileName results in command injection. Remote exploitation of the attack is possible. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-02-24
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote code execution
Action: Apply Mitigation
AI Analysis

Impact

The flaw resides in the CommandUtils.commonExecCmdWithResult method within the CloudTaskService.java component of HummerRisk, affecting all releases up to 1.5.0. An attacker can exploit the fileName parameter to inject arbitrary operating‑system commands, permitting remote execution of code on the host machine. This vulnerability embodies CWE‑74 (Improper Validation of Quoted Strings) and CWE‑77 (OS Command Injection). The impact is the loss of confidentiality, integrity, and availability for the affected system as an attacker can run any command with the privileges of the service.

Affected Systems

All installations of HummerRisk produced by the vendor HummerRisk, specifically versions up to and including 1.5.0, are impacted. No further version details are supplied.

Risk and Exploitability

The CVSS score of 5.3 indicates a medium severity risk, while the EPSS score of less than 1% suggests a low likelihood of exploitation at present. The vulnerability is not listed in CISA’s KEV catalog. Remote exploitation is possible, typically via exposed API endpoints or interfaces that allow manipulation of the fileName argument. In the absence of an official patch, the risk remains medium but can become higher if the service is exposed to untrusted users.

Generated by OpenCVE AI on April 16, 2026 at 16:29 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Contact HummerRisk support and request a security update for the Cloud Task Dry‑run component or above version 1.5.0.
  • Limit external access to the HummerRisk service by firewalling or network segmentation so only trusted hosts can reach the command‑execution API.
  • Sanitize and validate the fileName input on the application side to remove any shell metacharacters before it is passed to the command execution routine.

Generated by OpenCVE AI on April 16, 2026 at 16:29 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 28 Feb 2026 03:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 24 Feb 2026 21:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:hummerrisk:hummerrisk:*:*:*:*:*:*:*:*

Tue, 24 Feb 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Hummerrisk
Hummerrisk hummerrisk
Vendors & Products Hummerrisk
Hummerrisk hummerrisk

Tue, 24 Feb 2026 03:00:00 +0000

Type Values Removed Values Added
Description A vulnerability was detected in HummerRisk up to 1.5.0. This affects the function CommandUtils.commonExecCmdWithResult of the file CloudTaskService.java of the component Cloud Task Dry-run. Performing a manipulation of the argument fileName results in command injection. Remote exploitation of the attack is possible. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title HummerRisk Cloud Task Dry-run CloudTaskService.java CommandUtils.commonExecCmdWithResult command injection
Weaknesses CWE-74
CWE-77
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Hummerrisk Hummerrisk
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-28T02:11:08.525Z

Reserved: 2026-02-23T18:51:02.577Z

Link: CVE-2026-3065

cve-icon Vulnrichment

Updated: 2026-02-28T02:11:02.781Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-24T03:16:03.653

Modified: 2026-02-24T21:05:47.217

Link: CVE-2026-3065

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T16:30:15Z

Weaknesses