Intel

AIKIDO-2026-10114

@qwen-code/qwen-code is vulnerable to Command Injection

Command Injection Pre-CVE
Found by Aikido Intel before public disclosure or CVE publication.

44

Medium Risk

This Affects:

JS@qwen-code/qwen-code
0.0.1 - 0.7.2
Fixed in 0.8.0

TL;DR

Affected versions of this package treated awk and sed commands as read-only even though they support side-effects like system() execution, file writes, and shell pipelines. This could allow crafted awk or sed input to execute arbitrary commands or perform file operations without user confirmation. The patched version adds comprehensive pattern-based detection for dangerous constructs in awk and sed, rejecting commands with side-effects and preventing unintended command execution.

Who does this affect?

You are affected if you are using a version that falls within the vulnerable range. Requires user interaction / untrusted input in CLI context.

Background info

@qwen-code/qwen-code is vulnerable to Command Injection in versions 0.0.1 - 0.7.2.

How to fix this

Upgrade the @qwen-code/qwen-code library to the patch version.

Background Info