Description
Aperi'Solve is an open-source steganalysis web platform. Prior to 3.2.1, when uploading a JPEG, a user can specify an optional password to accompany the JPEG. This password is then directly passed into an expect command, which is then subsequently passed into a bash -c command, without any form of sanitization or validation. An unauthenticated attacker can achieve root-level RCE inside the worker container with a single HTTP request, enabling full read/write access to all user-uploaded images, analysis results, and plaintext steganography passwords stored on disk. Because the container shares a Docker network with PostgreSQL and Redis (no authentication on either), the attacker can pivot to dump the entire database or manipulate the job queue to poison results for other users. If Docker socket mounting or host volume mounts are present, this could escalate to full host compromise. This would also include defacement of the website itself. This vulnerability is fixed in 3.2.1.
Published: 2026-04-06
Score: 9.3 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Patch Immediately
AI Analysis

Impact

Aperi'Solve, an open‑source steganalysis web platform, contains a command‑injection flaw that allows an unauthenticated attacker to execute arbitrary system commands with root privileges inside the worker container. The vulnerability arises when a password supplied during a JPEG upload is unsanitized and passed to an expect command that in turn executes a bash -c. By exploiting this, the attacker can read, modify, or delete any file in the container, including user images, analysis results, and stored plaintext steganography passwords. The absence of authentication on the container network also permits the attacker to access connected PostgreSQL and Redis instances, potentially dumping the entire database or tampering with other users’ job queues. If the host has Docker socket or volume mounts exposed, the flaw could further elevate to full host compromise and website defacement.

Affected Systems

The vulnerability affects versions of Zeecka’s AperiSolve platform older than 3.2.1. Attackers need only the open web interface; no special credentials are required. The flaw is present in all installations that use the default Docker networking without authentication to PostgreSQL or Redis.

Risk and Exploitability

The flaw scores a CVSS of 9.3, indicating critical severity. EPSS data is unavailable, and the vulnerability is not currently listed in the CISA KEV catalog, but its exploitation requires only a single unauthenticated HTTP request. Because the affected code executes commands in the container’s root path, an attacker can achieve full read/write access and, depending on host exposure, potentially pivot to the underlying host system. The risk remains high until the fixed 3.2.1 release is applied.

Generated by OpenCVE AI on April 6, 2026 at 19:36 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to AperiSolve 3.2.1 or later to eliminate the command‑injection flaw.
  • Verify that no Docker socket or host volume mounts are exposed to the container.
  • Ensure that PostgreSQL and Redis instances enforce authentication and are not left on an open network.
  • Block external access to the worker container’s network if possible.

Generated by OpenCVE AI on April 6, 2026 at 19:36 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 22 Apr 2026 20:00:00 +0000

Type Values Removed Values Added
First Time appeared Aperisolve
Aperisolve aperisolve
CPEs cpe:2.3:a:aperisolve:aperisolve:*:*:*:*:*:*:*:*
Vendors & Products Aperisolve
Aperisolve aperisolve
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Tue, 07 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 07 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
First Time appeared Zeecka
Zeecka aperisolve
Vendors & Products Zeecka
Zeecka aperisolve

Mon, 06 Apr 2026 16:45:00 +0000

Type Values Removed Values Added
Description Aperi'Solve is an open-source steganalysis web platform. Prior to 3.2.1, when uploading a JPEG, a user can specify an optional password to accompany the JPEG. This password is then directly passed into an expect command, which is then subsequently passed into a bash -c command, without any form of sanitization or validation. An unauthenticated attacker can achieve root-level RCE inside the worker container with a single HTTP request, enabling full read/write access to all user-uploaded images, analysis results, and plaintext steganography passwords stored on disk. Because the container shares a Docker network with PostgreSQL and Redis (no authentication on either), the attacker can pivot to dump the entire database or manipulate the job queue to poison results for other users. If Docker socket mounting or host volume mounts are present, this could escalate to full host compromise. This would also include defacement of the website itself. This vulnerability is fixed in 3.2.1.
Title Aperi'Solve Affected by Unauthenticated RCE via JPSeek Analyzer Command
Weaknesses CWE-78
References
Metrics cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L'}


Subscriptions

Aperisolve Aperisolve
Zeecka Aperisolve
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-07T14:11:39.423Z

Reserved: 2026-03-31T19:38:31.617Z

Link: CVE-2026-34977

cve-icon Vulnrichment

Updated: 2026-04-07T14:11:29.193Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-06T17:17:11.543

Modified: 2026-04-22T19:47:09.913

Link: CVE-2026-34977

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-06T21:31:39Z

Weaknesses