Skip to content
Threat Feed
critical advisory

CoolerControl Command Injection Vulnerability (CVE-2026-5208)

CoolerControl/coolercontrold versions before 4.0.0 are vulnerable to command injection, allowing authenticated attackers with high privileges to execute arbitrary code as root by injecting bash commands into alert names.

CoolerControl/coolercontrold, a system monitoring and management tool, is susceptible to a command injection vulnerability (CVE-2026-5208) in versions prior to 4.0.0. The vulnerability stems from insufficient sanitization of user-supplied input used to create alert names. An authenticated attacker with high privileges can inject arbitrary bash commands into the alert name field. Due to the application’s execution context, these injected commands are executed with root privileges, potentially leading to complete system compromise. The vulnerability was reported and patched in version 4.0.0. This poses a significant risk to organizations using affected versions of CoolerControl/coolercontrold, as it allows for trivial privilege escalation and arbitrary code execution.

Attack Chain

  1. Attacker authenticates to the CoolerControl/coolercontrold application with high-privilege credentials.
  2. Attacker navigates to the alert configuration section of the application.
  3. Attacker crafts a malicious alert name containing injected bash commands (e.g., test; rm -rf /;).
  4. Attacker saves the new alert configuration with the injected command in the alert name.
  5. When the alert is triggered or processed by the application, the injected command is executed within the context of the CoolerControl/coolercontrold process.
  6. Due to insufficient input validation, the operating system executes the injected command, in this example rm -rf / which would recursively delete every file on the system.
  7. The injected commands are executed with root privileges, resulting in arbitrary code execution.
  8. The attacker gains complete control of the system.

Impact

Successful exploitation of CVE-2026-5208 allows an attacker to execute arbitrary code with root privileges on the affected system. This could lead to complete system compromise, including data theft, data destruction, denial of service, and the installation of backdoors or other malicious software. Since this can be exploited via an application setting, a wide range of systems could be impacted.

Recommendation

  • Upgrade CoolerControl/coolercontrold to version 4.0.0 or later to patch CVE-2026-5208, as mentioned in the vulnerability description.
  • Deploy the Sigma rule Detect Suspicious Alert Creation to identify attempts to inject commands into alert names.
  • Monitor process creation events for suspicious commands executed by the CoolerControl/coolercontrold process. Enable Sysmon process-creation logging to facilitate this.
  • Review existing alert configurations for any suspicious or unexpected commands.

Detection coverage 2

Detect Suspicious Alert Creation

high

Detects creation of alerts with potentially malicious commands in the name field.

sigma tactics: execution techniques: T1059.004 sources: process_creation, linux

Detect Suspicious Process Spawned by coolercontrold

critical

Detects suspicious processes spawned by coolercontrold, indicating potential command injection.

sigma tactics: execution techniques: T1059.004 sources: process_creation, linux

Detection queries are kept inside the platform. Get full rules →