CVE-2026-30352
Published: 27 April 2026
Summary
CVE-2026-30352 is a critical-severity Command Injection (CWE-77) vulnerability in Autocoder (inferred from references). Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 42.4% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly prevents command injection in the /devserver/start endpoint by validating and sanitizing the crafted command parameter.
Ensures timely identification, reporting, and correction of the specific RCE flaw in autocoder commit 79d02a to eliminate exploitability.
Limits the scope and impact of successful RCE by enforcing least privilege on the process handling the vulnerable endpoint.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability is a remote code execution via command injection in a public-facing web endpoint (/devserver/start), directly enabling exploitation of public-facing applications.
NVD Description
A remote code execution (RCE) vulnerability in the /devserver/start endpoint of leonvanzyl autocoder commit 79d02a allows attackers to execute arbitrary code via providing a crafted command parameter.
Deeper analysisAI
CVE-2026-30352 is a remote code execution (RCE) vulnerability affecting the /devserver/start endpoint in leonvanzyl's autocoder project at commit 79d02a. Published on 2026-04-27, it stems from CWE-77 (Command Injection) and carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). Attackers can exploit it by supplying a crafted command parameter, enabling arbitrary code execution on the targeted system.
The vulnerability is exploitable remotely over the network by unauthenticated attackers with no privileges required and no user interaction needed. Successful exploitation grants high-impact access to confidentiality, integrity, and availability, allowing full RCE on the server hosting the vulnerable autocoder instance.
Advisories and related resources, including the project GitHub repository at https://github.com/leonvanzyl/autocoder, a Gist at https://gist.github.com/syphonetic/e3bdee6c022b36d5ecb98fbf61284931, and sites http://autocoder.com and http://leonvanzyl.com, provide further details on the issue, though specific mitigation or patch guidance is not detailed in the CVE description.
Details
- CWE(s)