CVE-2026-26009

Source
https://cve.org/CVERecord?id=CVE-2026-26009
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-26009.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-26009
Aliases
  • GHSA-xv5r-cpcw-8wr3
Published
2026-02-10T18:58:02.732Z
Modified
2026-02-13T16:40:28.300337Z
Severity
  • 9.9 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H CVSS Calculator
Summary
Catalyst Affected by Remote Code Execution as Root via Containerized Install Script Execution
Details

Catalyst is a platform built for enterprise game server hosts, game communities, and billing panel integrations. Install scripts defined in server templates execute directly on the host operating system as root via bash -c, with no sandboxing or containerization. Any user with template.create or template.update permission can define arbitrary shell commands that achieve full root-level remote code execution on every node machine in the cluster. This vulnerability is fixed in commit 11980aaf3f46315b02777f325ba02c56b110165d.

Database specific
{
    "cwe_ids": [
        "CWE-78"
    ],
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/26xxx/CVE-2026-26009.json"
}
References

Affected packages

Git / github.com/catalystctl/catalyst

Affected ranges

Type
GIT
Repo
https://github.com/catalystctl/catalyst
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-26009.json"