<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-26832 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-26832/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 26 Mar 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-26832/feed.xml" rel="self" type="application/rss+xml"/><item><title>node-tesseract-ocr OS Command Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-03-node-tesseract-ocr-command-injection/</link><pubDate>Thu, 26 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-node-tesseract-ocr-command-injection/</guid><description>The node-tesseract-ocr npm package through version 2.2.1 is vulnerable to OS command injection due to improper sanitization of the file path parameter in the recognize() function, potentially allowing for arbitrary command execution.</description><content:encoded><![CDATA[<p>The node-tesseract-ocr npm package, a Node.js wrapper for Tesseract OCR, is vulnerable to OS command injection (CVE-2026-26832) in versions 2.2.1 and earlier. The vulnerability exists within the <code>recognize()</code> function located in <code>src/index.js</code>. The <code>file path</code> parameter, used to specify the image for OCR processing, is directly concatenated into a shell command string without proper sanitization. This unsanitized string is then passed to <code>child_process.exec()</code>, enabling attackers to inject arbitrary commands that are executed by the system. Exploitation can lead to complete system compromise, data exfiltration, or denial of service.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious file path containing OS commands.</li>
<li>The attacker passes the malicious file path to the <code>recognize()</code> function within the <code>node-tesseract-ocr</code> package.</li>
<li>The <code>recognize()</code> function concatenates the attacker-controlled file path into a command string.</li>
<li>The command string, now containing injected OS commands, is passed to <code>child_process.exec()</code>.</li>
<li><code>child_process.exec()</code> executes the command string.</li>
<li>The injected OS commands are executed by the system with the privileges of the Node.js process.</li>
<li>The attacker gains arbitrary code execution on the target system.</li>
<li>The attacker can then perform actions such as installing malware, creating new user accounts, or exfiltrating sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to execute arbitrary commands on the server hosting the Node.js application. This can lead to complete system compromise, potentially impacting all data and services hosted on the compromised server. The severity is heightened because the vulnerability is remotely exploitable and requires no user interaction. Systems using affected versions of <code>node-tesseract-ocr</code> are at high risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the <code>node-tesseract-ocr</code> package to a patched version that addresses CVE-2026-26832 if available.</li>
<li>Implement strict input validation and sanitization for the file path parameter passed to the <code>recognize()</code> function, mitigating command injection attempts.</li>
<li>Monitor process creation events for unusual processes spawned by Node.js (<code>node.exe</code> or <code>node</code>) to detect potential exploitation using the provided Sigma rule.</li>
<li>Review and audit all uses of <code>child_process.exec()</code> within Node.js applications to identify and remediate other potential command injection vulnerabilities.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>command-injection</category><category>nodejs</category><category>tesseract-ocr</category><category>cve-2026-26832</category></item></channel></rss>