<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>CVE-2026-45695 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-45695/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 19 May 2026 19:20:30 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-45695/feed.xml" rel="self" type="application/rss+xml"/><item><title>Kopia RCE via SSH ProxyCommand Injection (CVE-2026-45695)</title><link>https://feed.craftedsignal.io/briefs/2026-05-kopia-rce/</link><pubDate>Tue, 19 May 2026 19:20:30 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-kopia-rce/</guid><description>Kopia's HTTP server, when started without `--without-password`, accepts unauthenticated requests which can lead to arbitrary command execution as the Kopia process user via `-oProxyCommand` in `sshArguments` for SFTP backends with `externalSSH: true`. An attacker-supplied storage configuration is forwarded to `blob.NewStorage`, and the `sshArguments` are split on spaces and passed directly to `exec.CommandContext("ssh")`, resulting in command injection.</description><content:encoded><![CDATA[<p>Kopia is vulnerable to remote command execution (CVE-2026-45695) when its HTTP server is started without authentication (<code>--without-password</code>) and configured to use an SFTP backend with <code>externalSSH: true</code>. This configuration flaw allows unauthenticated attackers to send a crafted HTTP request to the <code>/api/v1/repo/exists</code> endpoint. The vulnerability stems from the lack of proper input validation of <code>sshArguments</code> within the SFTP storage configuration. An attacker can inject arbitrary commands by including <code>-oProxyCommand=&lt;cmd&gt;</code> in the <code>sshArguments</code>. This leads to command execution as the Kopia process user due to how OpenSSH handles the <code>ProxyCommand</code> option. This issue affects Kopia versions 0.22.3 and earlier.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Kopia HTTP server is started without authentication using the <code>--without-password</code> flag.</li>
<li>The server is configured to use an SFTP backend with <code>externalSSH: true</code>.</li>
<li>Attacker sends an unauthenticated HTTP POST request to the <code>/api/v1/repo/exists</code> endpoint.</li>
<li>The request contains a crafted JSON body with malicious <code>sshArguments</code> including <code>-oProxyCommand=&lt;malicious_command&gt;</code>.</li>
<li>The server&rsquo;s <code>handleUIPossiblyNotConnected</code> function authorizes the request due to the missing authentication.</li>
<li>The <code>blob.NewStorage</code> function processes the attacker-supplied storage configuration.</li>
<li>Within the SFTP backend logic, <code>opt.SSHArguments</code> are populated from the JSON request body.</li>
<li>The <code>sshArguments</code> string is split on spaces and passed directly to <code>exec.CommandContext(&quot;ssh&quot;, ...)</code> without proper sanitization.</li>
<li>OpenSSH executes the injected command via <code>$SHELL -c &lt;malicious_command&gt;</code> before any TCP connection is attempted.</li>
<li>The attacker achieves arbitrary command execution as the Kopia process user.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-45695 allows unauthenticated attackers to execute arbitrary commands on the Kopia server. There is no need for user interaction or valid credentials. The attacker gains the privileges of the Kopia process user, potentially leading to complete system compromise. The impact includes data exfiltration, system disruption, or further lateral movement within the network.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to Kopia version 0.22.4 or later, which includes the fix described in <a href="https://github.com/kopia/kopia/pull/5354">https://github.com/kopia/kopia/pull/5354</a>. This disables starting a server without a password that also listens on a non-loopback interface.</li>
<li>If upgrading is not immediately feasible, ensure that the Kopia HTTP server is never started without authentication (<code>--server-username</code> or <code>--server-password</code>).</li>
<li>Deploy the Sigma rules provided in this brief to your SIEM to detect potential exploitation attempts of CVE-2026-45695.</li>
<li>Monitor web server logs for suspicious POST requests to the <code>/api/v1/repo/exists</code> endpoint with unusual <code>sshArguments</code> in the request body.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>rce</category><category>vulnerability</category><category>command-injection</category><category>kopia</category><category>CVE-2026-45695</category></item></channel></rss>