Cyber Posture

CVE-2026-30352

CriticalRCE

Published: 27 April 2026

Published
27 April 2026
Modified
27 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0035 57.6th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-30352 is a critical-severity Command Injection (CWE-77) vulnerability in Autocoder (inferred from references). Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 42.4% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly prevents command injection in the /devserver/start endpoint by validating and sanitizing the crafted command parameter.

prevent

Ensures timely identification, reporting, and correction of the specific RCE flaw in autocoder commit 79d02a to eliminate exploitability.

prevent

Limits the scope and impact of successful RCE by enforcing least privilege on the process handling the vulnerable endpoint.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The vulnerability is a remote code execution via command injection in a public-facing web endpoint (/devserver/start), directly enabling exploitation of public-facing applications.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

A remote code execution (RCE) vulnerability in the /devserver/start endpoint of leonvanzyl autocoder commit 79d02a allows attackers to execute arbitrary code via providing a crafted command parameter.

Deeper analysisAI

CVE-2026-30352 is a remote code execution (RCE) vulnerability affecting the /devserver/start endpoint in leonvanzyl's autocoder project at commit 79d02a. Published on 2026-04-27, it stems from CWE-77 (Command Injection) and carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). Attackers can exploit it by supplying a crafted command parameter, enabling arbitrary code execution on the targeted system.

The vulnerability is exploitable remotely over the network by unauthenticated attackers with no privileges required and no user interaction needed. Successful exploitation grants high-impact access to confidentiality, integrity, and availability, allowing full RCE on the server hosting the vulnerable autocoder instance.

Advisories and related resources, including the project GitHub repository at https://github.com/leonvanzyl/autocoder, a Gist at https://gist.github.com/syphonetic/e3bdee6c022b36d5ecb98fbf61284931, and sites http://autocoder.com and http://leonvanzyl.com, provide further details on the issue, though specific mitigation or patch guidance is not detailed in the CVE description.

Details

CWE(s)

Affected Products

Autocoder
inferred from references and description; NVD did not file a CPE for this CVE

CVEs Like This One

CVE-2026-30461Shared CWE-77
CVE-2025-24285Shared CWE-77
CVE-2025-56425Shared CWE-77
CVE-2025-55637Shared CWE-77
CVE-2024-39759Shared CWE-77
CVE-2026-22719Shared CWE-77
CVE-2026-26093Shared CWE-77
CVE-2024-39360Shared CWE-77
CVE-2024-23971Shared CWE-77
CVE-2025-64093Shared CWE-77

References