Cyber Posture

CVE-2026-28800

Medium

Published: 06 March 2026

Published
06 March 2026
Modified
10 March 2026
KEV Added
Patch
CVSS Score 6.4 CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
EPSS Score 0.0005 15.5th percentile
Risk Priority 13 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-28800 is a medium-severity Path Traversal (CWE-22) vulnerability in Natroteam Natro Macro. Its CVSS base score is 6.4 (Medium).

Operationally, exploitation aligns with the MITRE ATT&CK technique Bidirectional Communication (T1102.002); ranked at the 15.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense at a Glance

What attackers do: exploitation maps to Bidirectional Communication (T1102.002) and 3 other techniques.
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-287

Detects unauthorized successful logons resulting from improper authentication implementations.

addresses: CWE-287

Documented procedures ensure personnel are trained on authentication mechanisms, tangibly lowering the risk of improper authentication being exploited.

addresses: CWE-287

Security awareness training instructs users on secure authentication practices and avoiding credential compromise.

addresses: CWE-287

Training on authentication mechanisms and best practices decreases the occurrence of improper authentication.

addresses: CWE-287

Non-repudiation requires strong authentication mechanisms to irrefutably attribute performed actions to specific individuals or processes.

addresses: CWE-287

Session content review can reveal authentication bypasses or failures in session establishment.

addresses: CWE-287

Review of authentication-related audit records can detect improper authentication mechanisms or bypasses.

addresses: CWE-287

Assessments check authentication mechanisms for correct implementation and effectiveness, reducing successful authentication bypass attempts.

MITRE ATT&CK Enterprise TechniquesAI

T1102.002 Bidirectional Communication Command And Control
Adversaries may use an existing, legitimate external Web service as a means for sending commands to and receiving output from a compromised system over the Web service channel.
T1219 Remote Access Tools Command And Control
An adversary may use legitimate remote access tools to establish an interactive command and control channel within a network.
T1059.010 AutoHotKey & AutoIT Execution
Adversaries may execute commands and perform malicious tasks using AutoIT and AutoHotKey automation scripts.
T1105 Ingress Tool Transfer Command And Control
Adversaries may transfer tools or other files from an external system into a compromised environment.
Why these techniques?

Vulnerability in Discord-based remote control feature of AutoHotkey macro directly enables bidirectional C2 via web service (T1102.002), remote access tooling (T1219), AutoHotkey command execution for input simulation (T1059.010), and file ingress via unrestricted uploads/path traversal (T1105).

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

Natro Macro is an open-source Bee Swarm Simulator macro written in AutoHotkey. Prior to version 1.1.0, anyone with Discord Remote Control set up in a non-private channel gives access to any user with the permission to send message in said…

more

channel access to do anything on their computer. This includes keyboard and mouse inputs and full file access. This issue has been patched in version 1.1.0.

Deeper analysisAI

CVE-2026-28800 affects Natro Macro, an open-source Bee Swarm Simulator macro written in AutoHotkey, in versions prior to 1.1.0. The vulnerability arises from the use of Discord Remote Control in non-private channels, which improperly grants broad access to users with message-sending permissions in those channels. This flaw is classified under CWE-22 (Path Traversal), CWE-287 (Improper Authentication), and CWE-434 (Unrestricted Upload of File with Dangerous Type), with a CVSS v3.1 base score of 6.4 (AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H). The issue was published on 2026-03-06.

An attacker who has permission to send messages in a Discord channel where the victim has configured Remote Control can exploit this vulnerability. Exploitation requires the victim to have user interaction, such as approving the remote control session, and involves high attack complexity and high privileges on the attacker's side within the Discord context. Successful exploitation allows the attacker full control over the victim's computer, including simulating keyboard and mouse inputs as well as complete file system access.

The GitHub security advisory at https://github.com/NatroTeam/NatroMacro/security/advisories/GHSA-ph9r-2qjm-ghvg confirms that the issue has been addressed in Natro Macro version 1.1.0, recommending users upgrade to the patched version to mitigate the risk.

Details

CWE(s)

Affected Products

natroteam
natro macro
≤ 1.1.0

CVEs Like This One

CVE-2026-28801Same product: Natroteam Natro Macro
CVE-2024-55926Shared CWE-22, CWE-434
CVE-2026-2743Shared CWE-22, CWE-434
CVE-2025-9064Shared CWE-22, CWE-287
CVE-2025-66480Shared CWE-22, CWE-434
CVE-2022-50939Shared CWE-22, CWE-434
CVE-2025-65897Shared CWE-22, CWE-434
CVE-2026-26984Shared CWE-22, CWE-434
CVE-2025-2749Shared CWE-22, CWE-434
CVE-2025-35055Shared CWE-22, CWE-434

References