CVE-2026-5208
Command Injection in CoolerControl Alerts Allows Root Code Execution
Publication date: 2026-04-08
Last updated on: 2026-04-16
Assigner: GitLab Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| coolercontrol | coolercontrold | From 3.1.0 (inc) to 4.0.0 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-78 | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a command injection flaw in the alerts feature of CoolerControl's coolercontrold software versions prior to 4.0.0. Authenticated attackers can exploit this by injecting malicious bash commands into alert names, which are then executed with root privileges.
How can this vulnerability impact me? :
The impact of this vulnerability is severe because it allows an authenticated attacker to execute arbitrary code as the root user on the affected system. This can lead to full system compromise, including unauthorized access, data manipulation, disruption of services, and potential installation of persistent malware.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, upgrade CoolerControl/coolercontrold to version 4.0.0 or later, as this version includes security improvements such as enabling TLS/SSL by default.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability allows authenticated attackers to execute arbitrary code as root via command injection in alert names, which can lead to full system compromise.
Such a compromise can result in unauthorized access, modification, or destruction of sensitive data, potentially violating data protection requirements under standards like GDPR and HIPAA.
Therefore, this vulnerability poses a significant risk to compliance with these regulations by undermining the confidentiality, integrity, and availability of protected data.