OS Command Injection Affecting neuvector-scanner package, versions <3.962-r0


Severity

Recommended
low

Based on default assessment until relevant scores are available.

Threat Intelligence

EPSS
0.06% (18th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about OS Command Injection vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-WOLFILATEST-NEUVECTORSCANNER-15403476
  • published5 Mar 2026
  • disclosed30 Oct 2025

Introduced: 30 Oct 2025

CVE-2025-54469  (opens in a new tab)
CWE-78  (opens in a new tab)

How to fix?

Upgrade Wolfi neuvector-scanner to version 3.962-r0 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream neuvector-scanner package and not the neuvector-scanner package as distributed by Wolfi. See How to fix? for Wolfi relevant fixed versions and status.

A vulnerability was identified in NeuVector, where the enforcer used environment variables CLUSTER_RPC_PORT and CLUSTER_LAN_PORT to generate a command to be executed via popen, without first sanitising their values.

The entry process of the enforcer container is the monitor process. When the enforcer container stops, the monitor process checks whether the consul subprocess has exited. To perform this check, the monitor process uses the popen function to execute a shell command that determines whether the ports used by the consul subprocess are still active.

The values of environment variables CLUSTER_RPC_PORT and CLUSTER_LAN_PORT are used directly to compose shell commands via popen without validation or sanitization. This behavior could allow a malicious user to inject malicious commands through these variables within the enforcer container.