Intel

AIKIDO-2025-10872

kamal is vulnerable to Command Injection

Command Injection Pre-CVE
Found by Aikido Intel before public disclosure or CVE publication.

90

Critical Risk

This Affects:

RUBYkamal
2.7.0 - 2.8.2
Fixed in 2.9.0

TL;DR

Affected versions of Kamal are vulnerable to command injection attacks in its Passbolt adapter: an unsanitized folder ID (item["id"]) was interpolated directly into a shell command. The patched version adds .to_s.shellescape to that value before constructing the command, ensuring that any special characters are properly escaped — preventing arbitrary OS command execution when handling untrusted input.

Who does this affect?

You are affected if you are using a version that falls within the vulnerable range.

Background info

kamal is vulnerable to Command Injection in versions 2.7.0 - 2.8.2.

How to fix this

Upgrade the kamal library to the patch version.