Vulnerability Description
Termix is a web-based server management platform with SSH terminal, tunneling, and file editing capabilities. Prior to version 2.1.0, the extractArchive and compressFiles endpoints in file-manager.ts use double-quoted strings for shell command construction, unlike all other file manager operations which use single-quote escaping. Double quotes allow $(command) substitution, enabling command injection on the remote SSH host. This issue has been patched in version 2.1.0.
Related Weaknesses (CWE)
References
- https://github.com/Termix-SSH/Termix/releases/tag/release-2.1.0-tag
- https://github.com/Termix-SSH/Termix/security/advisories/GHSA-rvg4-7vvq-9c2w
- https://github.com/Termix-SSH/Termix/security/advisories/GHSA-rvg4-7vvq-9c2w
FAQ
What is CVE-2026-42453?
CVE-2026-42453 is a documented vulnerability. Termix is a web-based server management platform with SSH terminal, tunneling, and file editing capabilities. Prior to version 2.1.0, the extractArchive and compressFiles endpoints in file-manager.ts ...
How severe is CVE-2026-42453?
CVSS scoring is not yet available for CVE-2026-42453. Check NVD for updates.
Is there a patch for CVE-2026-42453?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.