Command Injection Affecting openhands-ai package, versions [,1.5.0)


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.22% (45th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Command Injection vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-PYTHON-OPENHANDSAI-15874142
  • published2 Apr 2026
  • disclosed25 Mar 2026
  • creditYue (Knox) Liu, Eran Shimony

Introduced: 25 Mar 2026

CVE-2026-33718  (opens in a new tab)
CWE-78  (opens in a new tab)

How to fix?

Upgrade openhands-ai to version 1.5.0 or higher.

Overview

openhands-ai is an OpenHands: Code Less, Make More

Affected versions of this package are vulnerable to Command Injection via the get_git_diff() method. An attacker can execute arbitrary commands, read sensitive files, write arbitrary files, establish persistent access, or potentially escape the container by supplying crafted input to the path parameter in the /api/conversations/{conversation_id}/git/diff API endpoint, which is unsafely interpolated into a shell command and executed with elevated privileges.

CVSS Base Scores

version 4.0
version 3.1