Description
A flaw has been found in HummerRisk up to 1.5.0. This vulnerability affects the function fixedCommand of the file hummer-common/hummer-common-core/src/main/java/com/hummer/common/core/utils/PlatformUtils.java of the component Cloud Compliance Scanning. Executing a manipulation can lead to command injection. The attack can be executed remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-02-24
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Command Injection
Action: Immediate Patch
AI Analysis

Impact

The vulnerability resides in the fixedCommand function of the PlatformUtils utility within the HummerRisk Cloud Compliance Scanning component. Malformed input can cause the operating system to execute arbitrary commands, compromising confidentiality, integrity, and availability. The flaw corresponds to classic command injection weaknesses, classified under CWE-74 and CWE-77.

Affected Systems

The flaw impacts HummerRisk Cloud Compliance Scanning, version 1.5.0 and earlier, as identified by the CPE hummerrisk:hummerrisk. All deployments using 1.5.0 or older are vulnerable.

Risk and Exploitability

The CVSS score of 5.3 indicates medium severity, while an EPSS of < 1% suggests a low probability of exploitation at present. Nevertheless, an exploit has already been published and the attack can be performed remotely, as stated in the description. No authentication is required beyond the ability to invoke the vulnerable API. The vulnerability is not listed in the KEV catalog.

Generated by OpenCVE AI on April 17, 2026 at 15:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade HummerRisk Cloud Compliance Scanning to a version newer than 1.5.0 that contains the PlatformUtils fixedCommand patch
  • Limit network access to the platform by implementing firewall rules that restrict exposure to trusted sources only
  • Monitor system and application logs for evidence of unexpected OS command execution or anomalous behavior
  • Consider isolating the scanning service in a sandboxed environment to mitigate the impact of a potential remote command injection

Generated by OpenCVE AI on April 17, 2026 at 15:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 25 Feb 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 24 Feb 2026 21:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:hummerrisk:hummerrisk:*:*:*:*:*:*:*:*

Tue, 24 Feb 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Hummerrisk
Hummerrisk hummerrisk
Vendors & Products Hummerrisk
Hummerrisk hummerrisk

Tue, 24 Feb 2026 04:00:00 +0000

Type Values Removed Values Added
Description A flaw has been found in HummerRisk up to 1.5.0. This vulnerability affects the function fixedCommand of the file hummer-common/hummer-common-core/src/main/java/com/hummer/common/core/utils/PlatformUtils.java of the component Cloud Compliance Scanning. Executing a manipulation can lead to command injection. The attack can be executed remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title HummerRisk Cloud Compliance Scanning PlatformUtils.java fixedCommand command injection
Weaknesses CWE-74
CWE-77
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Hummerrisk Hummerrisk
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-24T18:55:12.566Z

Reserved: 2026-02-23T18:51:05.297Z

Link: CVE-2026-3066

cve-icon Vulnrichment

Updated: 2026-02-24T18:55:05.632Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-24T04:15:58.980

Modified: 2026-02-24T21:05:59.363

Link: CVE-2026-3066

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T16:00:11Z

Weaknesses