CVE-2026-39087
Published: 23 April 2026
Description
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Security Summary
CVE-2026-39087, published on 2026-04-23, is a critical vulnerability (CVSS 9.8, CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) affecting Ntfy, specifically the ntfy.sh server before version 2.21. The issue resides in the parseActions function, enabling a remote attacker to execute arbitrary code, classified under CWE-94 (Code Injection).
Any remote attacker can exploit this vulnerability over the network with low attack complexity, requiring no privileges or user interaction. Successful exploitation allows full arbitrary code execution on the targeted Ntfy server, resulting in high impacts to confidentiality, integrity, and availability.
Advisories recommend updating to Ntfy version 2.21 or later to mitigate the vulnerability. Additional details are available in the references: http://ntfy.com, http://ntfysh.com, and https://gist.github.com/MightyNawaf/5d41d6e8ead16e217f86b016002ecae5.
Details
- CWE(s)
MITRE ATT&CK Enterprise Techniques
Why these techniques?
The vulnerability allows unauthenticated remote code execution on a public-facing Ntfy.sh server via code injection, directly mapping to exploitation of public-facing applications.