Description
Ghidra versions prior to 12.0.3 improperly process annotation directives embedded in automatically extracted binary data, resulting in arbitrary command execution when an analyst interacts with the UI. Specifically, the @execute annotation (which is intended for trusted, user-authored comments) is also parsed in comments generated during auto-analysis (such as CFStrings in Mach-O binaries). This allows a crafted binary to present seemingly benign clickable text which, when clicked, executes attacker-controlled commands on the analyst’s machine.
Published: 2026-03-29
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Command Execution
Action: Immediate Patch
AI Analysis

Impact

An engineered binary containing an @execute annotation tricks Ghidra’s auto‑analysis into displaying clickable text that, when the analyst clicks it, runs attacker‑supplied commands on the analyst’s machine. This abuses an OS command injection weakness (CWE‑78) and results in arbitrary code execution within the Ghidra process, compromising confidentiality, integrity, and availability of the system hosting the analysis.

Affected Systems

The flaw is present in all releases of Ghidra from the National Security Agency that precede version 12.0.3. Users who open malcrafted binaries containing CFStrings or similar metadata in these older versions are vulnerable whenever they interact with the generated annotation sentences.

Risk and Exploitability

The vulnerability carries a CVSS base score of 8.8, marking it high severity. No EPSS score is available and the flaw is currently not listed in CISA’s KEV catalog. The attacker must supply a malicious binary and rely on the analyst clicking the deceptive annotation; if this happens the exploit succeeds and commands execute with the privileges of the Ghidra process.

Generated by OpenCVE AI on March 29, 2026 at 20:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Ghidra release (12.0.3 or newer).
  • If an upgrade cannot be performed immediately, disable auto‑analysis of data sources that generate annotation directives such as CFStrings.
  • Limit analyst interaction with annotation links from untrusted binaries and verify the source of any binary before opening it.
  • Monitor analyst workstations for unexpected command‑line activity and enforce least‑privilege execution for Ghidra.

Generated by OpenCVE AI on March 29, 2026 at 20:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 30 Mar 2026 07:15:00 +0000

Type Values Removed Values Added
First Time appeared Nsa
Nsa ghidra
Vendors & Products Nsa
Nsa ghidra

Sun, 29 Mar 2026 19:45:00 +0000

Type Values Removed Values Added
Description Ghidra versions prior to 12.0.3 improperly process annotation directives embedded in automatically extracted binary data, resulting in arbitrary command execution when an analyst interacts with the UI. Specifically, the @execute annotation (which is intended for trusted, user-authored comments) is also parsed in comments generated during auto-analysis (such as CFStrings in Mach-O binaries). This allows a crafted binary to present seemingly benign clickable text which, when clicked, executes attacker-controlled commands on the analyst’s machine.
Title NSA Ghidra Auto-Analysis Annotation Command Execution
Weaknesses CWE-78
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: AHA

Published:

Updated: 2026-03-29T19:35:30.692Z

Reserved: 2026-03-27T02:17:29.992Z

Link: CVE-2026-4946

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-29T20:16:12.723

Modified: 2026-03-30T13:26:07.647

Link: CVE-2026-4946

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-30T06:58:01Z

Weaknesses