CVE-2026-26009
Published: 10 February 2026
Description
Catalyst is a platform built for enterprise game server hosts, game communities, and billing panel integrations. Install scripts defined in server templates execute directly on the host operating system as root via bash -c, with no sandboxing or containerization. Any…
more
user with template.create or template.update permission can define arbitrary shell commands that achieve full root-level remote code execution on every node machine in the cluster. This vulnerability is fixed in commit 11980aaf3f46315b02777f325ba02c56b110165d.
Mitigating Controls (NIST 800-53 r5)AI
Validates and sanitizes user-defined install scripts prior to execution to directly prevent OS command injection vulnerabilities like this one.
Enforces least privilege by ensuring install scripts execute without root privileges, comprehensively limiting the impact of any injected commands.
Restricts access to template.create and template.update functions to authorized personnel only, reducing the attack surface for injecting malicious scripts.
Security SummaryAI
CVE-2026-26009 is an OS command injection vulnerability (CWE-78) in the Catalyst platform, which is designed for enterprise game server hosts, game communities, and billing panel integrations. The issue stems from install scripts defined in server templates that execute directly on the host operating system as root via bash -c, without any sandboxing or containerization. This allows arbitrary commands to be injected and run with root privileges. The vulnerability has a CVSS v3.1 base score of 9.9 (AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H) and was published on 2026-02-10.
An attacker with template.create or template.update permissions can exploit this vulnerability by defining malicious shell commands in a server template. This leads to full root-level remote code execution on every node machine in the Catalyst cluster, enabling complete compromise of the host systems over the network with low complexity and no user interaction required.
The vulnerability is addressed in Catalyst commit 11980aaf3f46315b02777f325ba02c56b110165d, as detailed in the project's GitHub security advisory (GHSA-xv5r-cpcw-8wr3). Security practitioners should update to this commit or later to mitigate the issue.
Details
- CWE(s)
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
CVE enables remote exploitation of a public-facing application via OS command injection in server templates, allowing arbitrary bash command execution as root (T1190, T1059.004).