kamal is vulnerable to Command Injection
90
Critical Risk
Affected versions of Kamal are vulnerable to command injection attacks in its Passbolt adapter: an unsanitized folder ID (item["id"]) was interpolated directly into a shell command. The patched version adds .to_s.shellescape to that value before constructing the command, ensuring that any special characters are properly escaped — preventing arbitrary OS command execution when handling untrusted input.
You are affected if you are using a version that falls within the vulnerable range.
kamal is vulnerable to Command Injection in versions 2.7.0 - 2.8.2.
Upgrade the kamal library to the patch version.
Secure your code, cloud, and runtime environments in one central system. Find and fix vulnerabilities automatically.
No credit card required | Scan results in 32secs.
SOC 2Compliant
ISO 27001Compliant