Cyber Posture

CVE-2026-30352

Critical

Published: 27 April 2026

Published
27 April 2026
Modified
27 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0035 57.5th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

A remote code execution (RCE) vulnerability in the /devserver/start endpoint of leonvanzyl autocoder commit 79d02a allows attackers to execute arbitrary code via providing a crafted command parameter.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly prevents command injection in the /devserver/start endpoint by validating and sanitizing the crafted command parameter.

prevent

Ensures timely identification, reporting, and correction of the specific RCE flaw in autocoder commit 79d02a to eliminate exploitability.

prevent

Limits the scope and impact of successful RCE by enforcing least privilege on the process handling the vulnerable endpoint.

Security SummaryAI

CVE-2026-30352 is a remote code execution (RCE) vulnerability affecting the /devserver/start endpoint in leonvanzyl's autocoder project at commit 79d02a. Published on 2026-04-27, it stems from CWE-77 (Command Injection) and carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). Attackers can exploit it by supplying a crafted command parameter, enabling arbitrary code execution on the targeted system.

The vulnerability is exploitable remotely over the network by unauthenticated attackers with no privileges required and no user interaction needed. Successful exploitation grants high-impact access to confidentiality, integrity, and availability, allowing full RCE on the server hosting the vulnerable autocoder instance.

Advisories and related resources, including the project GitHub repository at https://github.com/leonvanzyl/autocoder, a Gist at https://gist.github.com/syphonetic/e3bdee6c022b36d5ecb98fbf61284931, and sites http://autocoder.com and http://leonvanzyl.com, provide further details on the issue, though specific mitigation or patch guidance is not detailed in the CVE description.

Details

CWE(s)

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The vulnerability is a remote code execution via command injection in a public-facing web endpoint (/devserver/start), directly enabling exploitation of public-facing applications.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References