CVE-2026-1427
Published: 26 January 2026
Description
Single Sign-On Portal System developed by WellChoose has a OS Command Injection vulnerability, allowing authenticated remote attackers to inject arbitrary OS commands and execute them on the server.
Mitigating Controls (NIST 800-53 r5)AI
Directly prevents OS command injection in the WellChoose SSO portal by enforcing validity checks on authenticated user inputs before OS execution.
Ensures timely flaw remediation for the specific OS command injection vulnerability, patching the root cause in the SSO system.
Limits damage from injected arbitrary OS commands by enforcing least privilege on the vulnerable portal's processes and accounts.
Security SummaryAI
CVE-2026-1427 is an OS command injection vulnerability (CWE-78) affecting the Single Sign-On Portal System developed by WellChoose. Published on 2026-01-26, it enables authenticated remote attackers to inject and execute arbitrary OS commands on the server. The vulnerability carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to its network accessibility, low complexity, and potential for significant impacts across confidentiality, integrity, and availability.
Attackers with low privileges, such as authenticated users, can exploit this remotely over the network without user interaction. By injecting malicious OS commands, they achieve arbitrary code execution on the server, granting high-level control that could lead to data theft, system modification, or disruption.
TWCERT/CC advisories detail the vulnerability at https://www.twcert.org.tw/en/cp-139-10655-59160-2.html and https://www.twcert.org.tw/tw/cp-132-10654-23f40-1.html.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
OS command injection in a remote SSO portal enables exploitation of public-facing application (T1190), arbitrary OS command execution (T1059), and privilege escalation from low-privileged authenticated access (T1068).