The Orbit agent's FileVault disk encryption key rotation flow on collects a local user's password via a GUI dialog and interpolates it directly into a Tcl/expect script executed via exec.Command("expect", "-c", script). Because the password is inserted into Tcl brace-quoted send {%s}, a password containing } terminates the literal and injects arbitrary Tcl commands. Since Orbit runs as root, this allows a local unprivileged user to escalate to root privileges.
This vulnerability was discovered and reported by bugbunny.ai.
{
"nvd_published_at": null,
"severity": "HIGH",
"github_reviewed": true,
"cwe_ids": [
"CWE-78"
],
"github_reviewed_at": "2026-04-08T18:03:52Z"
}