Zero Day Monitor
DashboardVulnerabilitiesTrendingZero-DaysNews
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
1165 articles · 105240 vulns · 38/41 feeds (7d)
← Back to list
7.6
CVE-2026-33718EXPLOITED
openhands · OpenHands

OpenHands is Vulnerable to Command Injection through its Git Diff Handler

Description

A vulnerability described as critical has been identified in OpenHands up to 1.4.x. This affects the function get_git_diff of the file openhands/runtime/utils/git_handler.py of the component API Endpoint. Executing a manipulation of the argument path can lead to os command injection. This vulnerability is handled as CVE-2026-33718. The attack can be executed remotely. There is not any exploit available. Upgrading the affected component is recommended.

Affected Products

VendorProductVersions
openhandsOpenHands< 1.5.0, 1.4.x

References

  • https://github.com/OpenHands/OpenHands/security/advisories/GHSA-7h8w-hj9j-8rjw(x_refsource_CONFIRM)
  • https://github.com/OpenHands/OpenHands/pull/13051(x_refsource_MISC)
  • https://docs.python.org/3/library/shlex.html#shlex.quote(x_refsource_MISC)
  • https://docs.python.org/3/library/subprocess.html#security-considerations(x_refsource_MISC)
  • https://owasp.org/www-community/attacks/Command_Injection(x_refsource_MISC)

Related News (1 articles)

Tier C
VulDB5h ago
CVE-2026-33718 | OpenHands up to 1.4.x API Endpoint git_handler.py get_git_diff path os command injection (GHSA-7h8w-hj9j-8rjw)
→ No new info (linked only)
CVSS 3.17.6 CRITICAL
VectorCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L
CISA KEV❌ No
Actively exploited✅ Yes
CWECWE-78
Published3/27/2026
Last enriched5h agov2
Trending Score49
Source articles1
Independent1
Info Completeness8/14
Missing: epss, kev, exploit, patch, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Pin to Dashboard

Verification

State: unverified
Confidence: 0%

Version History

v2
Last enriched 5h ago
v2Tier C5h ago

Updated product name to OpenHands, changed severity to CRITICAL, added affected version 1.4.x, and noted that the vulnerability is actively exploited.

descriptionproductaffectedVersionsseverityactivelyExploited
via VulDB
v19h ago

Initial creation