CVE-2026-26318
Published: 19 February 2026
Summary
CVE-2026-26318 is a high-severity OS Command Injection (CWE-78) vulnerability in Systeminformation Systeminformation. Its CVSS base score is 8.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Unix Shell (T1059.004); ranked at the 5.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 CM-10 (Software Usage Restrictions) and RA-5 (Vulnerability Monitoring and Scanning).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly requires timely remediation of the command injection flaw in systeminformation versions prior to 5.31.0 by applying the available patch.
Vulnerability scanning identifies the presence of vulnerable systeminformation library versions affected by CVE-2026-26318.
Restricts deployment and use of unapproved software versions, preventing installation of vulnerable systeminformation prior to 5.31.0.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
CWE-78 command injection in Node.js library directly enables Unix shell command execution (T1059.004) via unsanitized locate invocation; local low-priv access with scope change (S:C) and full system impact enables exploitation for privilege escalation (T1068).
NVD Description
systeminformation is a System and OS information library for node.js. Versions prior to 5.31.0 are vulnerable to command injection via unsanitized `locate` output in `versions()`. Version 5.31.0 fixes the issue.
Deeper analysisAI
CVE-2026-26318 is a command injection vulnerability (CWE-78) in the systeminformation library, a System and OS information tool for Node.js. Versions prior to 5.31.0 are affected due to unsanitized output from the `locate` command within the `versions()` function, allowing arbitrary command execution.
The vulnerability requires local access (AV:L), low attack complexity (AC:L), and low privileges (PR:L), with no user interaction (UI:N). Exploitation leads to a scope change (S:C) and high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H), resulting in a CVSS v3.1 base score of 8.8. A local low-privileged attacker can inject and execute commands, potentially achieving full system compromise.
Version 5.31.0 of systeminformation resolves the issue. Additional details are available in the GitHub security advisory at GHSA-5vv4-hvf7-2h46 and the fixing commit b67d3715eec881038ccbaace2f2711419ac3e107.
Details
- CWE(s)