CVE-2026-8210
Command Injection in aandrew-me TGPT Update Handler
Publication date: 2026-05-09
Last updated on: 2026-05-09
Assigner: VulDB
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| aandrew-me | tgpt | to 2.11.1 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-77 | The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component. |
| CWE-74 | The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component. |
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :
If exploited, this vulnerability can allow an attacker with local access to execute arbitrary commands on your system. This could lead to unauthorized actions such as modifying files, installing malware, or gaining further access to sensitive information. Since the exploit has been publicly disclosed, the risk of attack is increased.
Can you explain this vulnerability to me?
This vulnerability exists in the aandrew-me tgpt software up to version 2.11.1 on Linux and macOS systems. It affects the function helper.Update in the helper.go file within the Update Handler component. The issue allows an attacker with local access to perform command injection, meaning they can execute arbitrary commands on the affected system by manipulating this function.