<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Mise — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/mise/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 07 Apr 2026 20:13:11 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/mise/feed.xml" rel="self" type="application/rss+xml"/><item><title>Mise Trust Bypass Vulnerability via Malicious .mise.toml</title><link>https://feed.craftedsignal.io/briefs/2026-04-mise-trust-bypass/</link><pubDate>Tue, 07 Apr 2026 20:13:11 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-mise-trust-bypass/</guid><description>A vulnerability in mise allows an attacker who can place a malicious .mise.toml file in a repository to bypass trust checks and execute arbitrary code via `[env] _.source` due to improper loading of trust settings.</description><content:encoded><![CDATA[<p>A critical vulnerability exists in the mise tool (versions 2026.2.18 through 2026.4.5) where local project configuration files (.mise.toml) are loaded <em>before</em> trust checks are performed. This allows an attacker who can influence the contents of a repository (e.g., through a pull request or direct commit) to inject malicious configurations that bypass intended trust restrictions. Specifically, an attacker can set <code>trusted_config_paths = [&quot;/&quot;]</code> within a crafted .mise.toml, which effectively trusts all configuration files, including the malicious one. This bypass then permits the execution of dangerous directives, such as arbitrary shell commands via <code>[env] _.source</code>, leading to potential system compromise. This vulnerability undermines the security model of mise by subverting the trust mechanism designed to prevent unauthorized code execution.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains the ability to modify a repository containing a mise project. This could be via a compromised account, a malicious pull request, or other means.</li>
<li>The attacker creates or modifies a <code>.mise.toml</code> file within the repository, adding the following lines:
<div class="highlight"><pre tabindex="0" class="chroma"><code class="language-toml" data-lang="toml"><span class="line"><span class="cl"><span class="p">[</span><span class="nx">settings</span><span class="p">]</span>
</span></span><span class="line"><span class="cl"><span class="nx">trusted_config_paths</span> <span class="p">=</span> <span class="p">[</span><span class="s2">&#34;/&#34;</span><span class="p">]</span>
</span></span><span class="line"><span class="cl">
</span></span><span class="line"><span class="cl"><span class="p">[</span><span class="nx">env</span><span class="p">]</span>
</span></span><span class="line"><span class="cl"><span class="nx">_</span><span class="p">.</span><span class="nx">source</span> <span class="p">=</span> <span class="p">[</span><span class="s2">&#34;./poc.sh&#34;</span><span class="p">]</span>
</span></span></code></pre></div></li>
<li>The attacker creates or modifies a file <code>poc.sh</code> containing the malicious commands to be executed. For example:
<div class="highlight"><pre tabindex="0" class="chroma"><code class="language-bash" data-lang="bash"><span class="line"><span class="cl"><span class="cp">#!/usr/bin/env bash
</span></span></span><span class="line"><span class="cl"><span class="nb">echo</span> <span class="s2">&#34;Exploited!&#34;</span> &gt; /tmp/pwned.txt
</span></span></code></pre></div></li>
<li>A user clones the repository and navigates to the project directory.</li>
<li>The user executes the command <code>mise hook-env -s bash --force</code>. This command is intended to set up the environment based on the <code>.mise.toml</code> configuration.</li>
<li>Because <code>trusted_config_paths</code> is set to <code>/</code>, the <code>.mise.toml</code> file is considered trusted and the <code>[env] _.source</code> directive is executed.</li>
<li>The <code>poc.sh</code> script is executed, resulting in arbitrary code execution. In this example, the <code>/tmp/pwned.txt</code> file is created containing &ldquo;Exploited!&rdquo;.</li>
<li>The attacker has achieved arbitrary code execution on the user&rsquo;s system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows an attacker to execute arbitrary code on the victim&rsquo;s machine. The number of potential victims is equal to the number of users who clone and use a repository containing the malicious <code>.mise.toml</code> file and are using a vulnerable version of <code>mise</code> (2026.2.18 - 2026.4.5). The impact ranges from data theft and system compromise to complete control of the affected system, depending on the commands executed by the attacker&rsquo;s script. Organizations using mise for environment management are particularly at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to a patched version of <code>mise</code> greater than 2026.4.5 to address CVE-2026-35533.</li>
<li>Deploy the Sigma rule <code>Detect Mise Hook-Env with Dot Source</code> to identify potential exploitation attempts based on the <code>mise hook-env</code> command.</li>
<li>Monitor for the creation of unexpected files (e.g., in /tmp) after the execution of <code>mise hook-env</code> commands.</li>
<li>Implement code review processes to prevent the introduction of malicious <code>.mise.toml</code> files into repositories.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>mise</category><category>trust-bypass</category><category>code-execution</category><category>vulnerability</category></item></channel></rss>