Arbitrary Argument Injection Affecting tracexec package, versions <0.14.0


Severity

Recommended
0.0
low
0
10

CVSS assessment by Snyk's Security Team. Learn more

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Arbitrary Argument Injection vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-RUST-TRACEXEC-13545777
  • published14 Oct 2025
  • disclosed13 Oct 2025
  • creditLevi Zim

Introduced: 13 Oct 2025

New CVE NOT AVAILABLE CWE-77  (opens in a new tab)
CWE-88  (opens in a new tab)

How to fix?

Upgrade tracexec to version 0.14.0 or higher.

Overview

Affected versions of this package are vulnerable to Arbitrary Argument Injection in the command line reconstruction process when environment variables with keys starting with a dash are present. An attacker can cause inaccurate command line reconstruction and potential argument injection by crafting such environment variables and convincing a user to copy and execute the reconstructed command line in a terminal.

##Workaround

This vulnerability can be mitigated by avoiding copying and executing commands from the interface that contain environment variables with keys starting with a dash.

CVSS Base Scores

version 4.0
version 3.1