Cyber Posture

CVE-2026-3066

MediumPublic PoC

Published: 24 February 2026

Published
24 February 2026
Modified
24 February 2026
KEV Added
Patch
CVSS Score 6.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
EPSS Score 0.0060 69.7th percentile
Risk Priority 13 60% EPSS · 20% KEV · 20% CVSS

Description

A flaw has been found in HummerRisk up to 1.5.0. This vulnerability affects the function fixedCommand of the file hummer-common/hummer-common-core/src/main/java/com/hummer/common/core/utils/PlatformUtils.java of the component Cloud Compliance Scanning. Executing a manipulation can lead to command injection. The attack can be executed remotely.…

more

The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly prevents command injection by requiring validation of inputs to the vulnerable fixedCommand function in PlatformUtils.java.

prevent

Mandates timely remediation of the identified command injection flaw in HummerRisk, preventing exploitation through patching or workarounds.

detect

Facilitates detection of CVE-2026-3066 via vulnerability scanning of HummerRisk deployments up to version 1.5.0.

Security SummaryAI

CVE-2026-3066 is a command injection vulnerability affecting HummerRisk versions up to 1.5.0. The flaw resides in the fixedCommand function within the file hummer-common/hummer-common-core/src/main/java/com/hummer/common/core/utils/PlatformUtils.java, part of the Cloud Compliance Scanning component. It enables manipulation that leads to arbitrary command execution and is remotely exploitable.

Attackers with low privileges can exploit this vulnerability over the network with low complexity and no user interaction required. Successful exploitation grants limited impacts on confidentiality, integrity, and availability, as reflected in its CVSS v3.1 base score of 6.3 (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L). The issue maps to CWE-74 and CWE-77.

Advisories from VulDB and a GitHub issue in the AnalogyC0de/public_exp repository detail the vulnerability, including a publicly available exploit. The vendor was contacted early for disclosure but provided no response, and no patches or official mitigations have been issued.

Notable context includes the published exploit, which may already be in use, heightening risks for exposed HummerRisk deployments. The vulnerability was published on 2026-02-24.

Details

CWE(s)

Affected Products

hummerrisk
hummerrisk
≤ 1.5.0

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059 Command and Scripting Interpreter Execution
Adversaries may abuse command and script interpreters to execute commands, scripts, or binaries.
Why these techniques?

Command injection vulnerability in a remotely exploitable cloud compliance scanning component enables exploitation of public-facing applications (T1190) and facilitates arbitrary command execution (T1059).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References