← Back to CVEs
CVE-2026-34430
HIGH8.8
Description
ByteDance Deer-Flow versions prior to commit 92c7a20 contain a sandbox escape vulnerability in bash tool handling that allows attackers to execute arbitrary commands on the host system by bypassing regex-based validation using shell features such as directory changes and relative paths. Attackers can exploit the incomplete shell semantics modeling to read and modify files outside the sandbox boundary and achieve arbitrary command execution through subprocess invocation with shell interpretation enabled.
CVE Details
CVSS v3.1 Score8.8
SeverityHIGH
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionREQUIRED
Published4/1/2026
Last Modified4/2/2026
Sourcenvd
Honeypot Sightings0
Affected Products
deerflow:deerflow
Weaknesses (CWE)
CWE-184
References
https://github.com/bytedance/deer-flow/commit/92c7a20cb74addc3038d2131da78f2e239ef542e(disclosure@vulncheck.com)
https://github.com/bytedance/deer-flow/pull/1547(disclosure@vulncheck.com)
https://www.vulncheck.com/advisories/bytedance-deerflow-localsandboxprovider-host-bash-escape(disclosure@vulncheck.com)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.