Description
OpenHands is software for AI-driven development. Starting in version 1.5.0, a Command Injection vulnerability exists in the `get_git_diff()` method at `openhands/runtime/utils/git_handler.py:134`. The `path` parameter from the `/api/conversations/{conversation_id}/git/diff` API endpoint is passed unsanitized to a shell command, allowing authenticated attackers to execute arbitrary commands in the agent sandbox. The user is already allowed to instruct the agent to execute commands, but this bypasses the normal channels. Version 1.5.0 fixes the issue.
Published: 2026-03-27
Score: 7.6 High
EPSS: < 1% Very Low
KEV: No
Impact: Arbitrary command execution in the agent sandbox
Action: Immediate Patch
AI Analysis

Impact

A Command Injection flaw resides in the get_git_diff() function that builds a shell command with the path supplied by the /api/conversations/{conversation_id}/git/diff endpoint. Unsanitized input allows an authenticated user to inject arbitrary shell commands, which then run inside the agent’s sandbox environment. The weakness is categorized as CWE‑78, a classic command execution vulnerability that bypasses the normal command‐execution controls of OpenHands.

Affected Systems

The flaw exists in all OpenHands releases prior to version 1.5.0. The affected component is the git diff handler located in openhands/runtime/utils/git_handler.py, and the vulnerability is triggered by calls to the aforementioned API endpoint. Only users with valid authentication who can access that endpoint are able to exploit the issue.

Risk and Exploitability

The vulnerability carries a CVSS score of 7.6, indicating high severity. EPSS data is unavailable and the issue is not listed in the CISA KEV catalog. Exploitation requires authenticated access to the diff API; once invoked, the attacker can execute any shell command within the sandbox. While the compromise is confined to the sandbox, it can still lead to data exfiltration or privilege escalation if the sandbox has access to sensitive resources.

Generated by OpenCVE AI on March 27, 2026 at 06:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade OpenHands to version 1.5.0 or later, which patches the command injection flaw.
  • Restrict access to the /api/conversations/{conversation_id}/git/diff endpoint by limiting its use to trusted users and applying the least privilege principle to API permissions.
  • If an upgrade cannot be performed immediately, temporarily disable the git diff endpoint or add input sanitization to quote the path until the patch is applied.

Generated by OpenCVE AI on March 27, 2026 at 06:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-7h8w-hj9j-8rjw OpenHands is Vulnerable to Command Injection through its Git Diff Handler
History

Fri, 27 Mar 2026 08:45:00 +0000

Type Values Removed Values Added
First Time appeared Openhands
Openhands openhands
Vendors & Products Openhands
Openhands openhands

Fri, 27 Mar 2026 04:00:00 +0000

Type Values Removed Values Added
Description OpenHands is software for AI-driven development. Starting in version 1.5.0, a Command Injection vulnerability exists in the `get_git_diff()` method at `openhands/runtime/utils/git_handler.py:134`. The `path` parameter from the `/api/conversations/{conversation_id}/git/diff` API endpoint is passed unsanitized to a shell command, allowing authenticated attackers to execute arbitrary commands in the agent sandbox. The user is already allowed to instruct the agent to execute commands, but this bypasses the normal channels. Version 1.5.0 fixes the issue.
Title OpenHands is Vulnerable to Command Injection through its Git Diff Handler
Weaknesses CWE-78
References
Metrics cvssV3_1

{'score': 7.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L'}


Subscriptions

Openhands Openhands
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-27T00:12:24.752Z

Reserved: 2026-03-23T17:06:05.749Z

Link: CVE-2026-33718

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-03-27T01:16:19.483

Modified: 2026-03-27T01:16:19.483

Link: CVE-2026-33718

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-27T09:22:37Z

Weaknesses