Cyber Posture

CVE-2026-24129

HighPublic PoCRCE

Published: 22 January 2026

Published
22 January 2026
Modified
26 February 2026
KEV Added
Patch
CVSS Score 8.0 CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
EPSS Score 0.0008 23.0th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-24129 is a high-severity OS Command Injection (CWE-78) vulnerability in Runtipi Runtipi. Its CVSS base score is 8.0 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Unix Shell (T1059.004); ranked at the 23.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Unix Shell (T1059.004) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly requires validation and sanitization of user-uploaded backup filenames to block shell metacharacters, preventing OS command injection during the restore process.

prevent

Enforces restrictions on filename inputs such as allowed characters, length, and format to prohibit shell metacharacters from being persisted to the host filesystem.

prevent

Mandates timely identification, reporting, and remediation of flaws like the unsanitized filename handling, ensuring patching to version 4.7.0 or equivalent fixes.

MITRE ATT&CK Enterprise TechniquesAI

T1059.004 Unix Shell Execution
Adversaries may abuse Unix shell commands and scripts for execution.
T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

OS command injection via unsanitized backup filenames directly enables Unix shell command execution (T1059.004) during restore; scope change from app to host execution with high impact also maps to exploitation for privilege escalation (T1068).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Runtipi is a Docker-based, personal homeserver orchestrator that facilitates multiple services on a single server. Versions 3.7.0 and above allow an authenticated user to execute arbitrary system commands on the host server by injecting shell metacharacters into backup filenames. The…

more

BackupManager fails to sanitize the filenames of uploaded backups. The system persists user-uploaded files directly to the host filesystem using the raw originalname provided in the request. This allows an attacker to stage a file containing shell metacharacters (e.g., $(id).tar.gz) at a predictable path, which is later referenced during the restore process. The successful storage of the file is what allows the subsequent restore command to reference and execute it. This issue has been fixed in version 4.7.0.

Deeper analysisAI

CVE-2026-24129 is an OS command injection vulnerability (CWE-78) in Runtipi, a Docker-based personal homeserver orchestrator that facilitates running multiple services on a single server. It affects versions 3.7.0 and above, stemming from the BackupManager's failure to sanitize filenames of uploaded backups. The system persists these user-uploaded files directly to the host filesystem using the raw originalname from the request, enabling injection of shell metacharacters into filenames.

An authenticated user with sufficient privileges can exploit this by uploading a backup file with a malicious filename containing shell metacharacters, such as $(id).tar.gz, to a predictable path on the host filesystem. During the subsequent restore process, the system references this file and executes the embedded command, achieving arbitrary system command execution on the host server. The CVSS v3.1 base score is 8.0 (AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H), reflecting network accessibility, high privileges required, changed scope, and high impacts on confidentiality, integrity, and availability.

The vulnerability has been fixed in Runtipi version 4.7.0. Mitigation details are available in the GitHub security advisory at https://github.com/runtipi/runtipi/security/advisories/GHSA-vrgf-rcj5-6gv9, the release notes at https://github.com/runtipi/runtipi/releases/tag/v4.7.0, and the fixing commit at https://github.com/runtipi/runtipi/commit/c3aa948885554a370d374692158a3bfe1cfdc85a.

Details

CWE(s)

Affected Products

runtipi
runtipi
3.7.0 — 4.7.0

CVEs Like This One

CVE-2026-32729Same product: Runtipi Runtipi
CVE-2026-25116Same product: Runtipi Runtipi
CVE-2026-31881Same product: Runtipi Runtipi
CVE-2026-5208Shared CWE-78
CVE-2025-10589Shared CWE-78
CVE-2026-22277Shared CWE-78
CVE-2026-34955Shared CWE-78
CVE-2025-56108Shared CWE-78
CVE-2025-23383Shared CWE-78
CVE-2026-22229Shared CWE-78

References