Intel

AIKIDO-2025-10894

turbo-ignore is vulnerable to Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') Pre-CVE
Found by Aikido Intel before public disclosure or CVE publication.

70

High Risk

This Affects:

JSturbo-ignore
1.10.14 - 2.6.2
Fixed in 2.6.3

TL;DR

Affected versions of this package contain a Command Injection in turbo-ignore Git Ref Validation vulnerability, where the use of execSync with shell commands allowed user-supplied git references from environment variables to be interpreted as shell commands. The fix replaces execSync with execFileSync to ensure inputs are treated as literal arguments. An attacker could exploit this by crafting a malicious git ref value (e.g., containing ; rm -rf /) within a controlled environment variable, which would then be executed with the application's privileges when the validation script runs.

Who does this affect?

You are affected if you are using a vulnerable version of the package.

Background info

turbo-ignore is vulnerable to Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in versions 1.10.14 - 2.6.2.

How to fix this

Upgrade the turbo-ignore library to the patch version.