<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>@Wdio/Browserstack-Service (&lt;= 9.23.2) — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/@wdio/browserstack-service--9.23.2/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 11 May 2026 17:55:09 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/@wdio/browserstack-service--9.23.2/feed.xml" rel="self" type="application/rss+xml"/><item><title>WebdriverIO BrowserStack Service Command Injection Vulnerability (CVE-2026-25244)</title><link>https://feed.craftedsignal.io/briefs/2026-05-webdriverio-cmd-injection/</link><pubDate>Mon, 11 May 2026 17:55:09 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-webdriverio-cmd-injection/</guid><description>A command injection vulnerability (CVE-2026-25244) in `@wdio/browserstack-service` allows remote code execution (RCE) by processing malicious git branch names in test orchestration, where an attacker can inject shell commands via a crafted git repository.</description><content:encoded><![CDATA[<p>A critical command injection vulnerability, tracked as CVE-2026-25244, has been identified in the <code>@wdio/browserstack-service</code> npm package, specifically affecting versions 9.23.2 and earlier. The vulnerability stems from the improper handling of git branch names within the test orchestration functionality. An attacker can exploit this flaw by crafting a malicious git repository with a branch name containing shell command injection payloads. When WebdriverIO processes this repository, the unsanitized branch name is passed to <code>execSync()</code>, leading to arbitrary command execution on the system. This poses a significant risk to CI/CD environments and developer workstations, potentially leading to complete system compromise and supply chain attacks.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker creates a malicious git repository, crafting a branch name embedded with shell command injection payloads (e.g., <code>main;touch${IFS}/tmp/pwned.txt;echo${IFS}PWNED</code>).</li>
<li>The attacker configures WebdriverIO to utilize the malicious repository, either explicitly through <code>testOrchestrationOptions.runSmartSelection.source</code> or implicitly by placing the repository in the current working directory.</li>
<li>WebdriverIO initiates test orchestration, triggering the <code>getGitMetadataForAISelection()</code> function within the <code>@wdio/browserstack-service</code>.</li>
<li>The <code>getGitMetadataForAISelection()</code> function retrieves the malicious branch name from the git repository.</li>
<li>The retrieved branch name, containing the injected shell commands, is directly interpolated into an <code>execSync()</code> call.</li>
<li>The <code>execSync()</code> function executes the crafted shell command, leading to arbitrary code execution on the host system.</li>
<li>The attacker achieves remote code execution, enabling them to perform actions such as creating files, modifying system configurations, or exfiltrating sensitive data.</li>
<li>The attacker can leverage the compromised system for lateral movement, further compromising the network or modifying build artifacts for a supply chain attack.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-25244 can result in Remote Code Execution on CI/CD servers or developer machines. This allows attackers to perform Information Disclosure by accessing environment variables, secrets, and credentials. Further impact includes Data Exfiltration of source code, SSH keys, and configuration files, System Compromise through backdoor installation and lateral movement, and Supply Chain Attacks through modification of build artifacts. All versions of <code>@wdio/browserstack-service</code> up to and including 9.23.2 are vulnerable.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade <code>@wdio/browserstack-service</code> to a version higher than 9.23.2 to remediate CVE-2026-25244.</li>
<li>Implement input validation and sanitization for git branch names to prevent command injection.</li>
<li>Deploy the Sigma rules provided below to detect potential exploitation attempts in your environment.</li>
<li>Enable process creation logging with command-line arguments to facilitate detection and investigation of command injection attempts.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>command-injection</category><category>rce</category><category>supply-chain</category></item></channel></rss>