ZAI Shell is an autonomous SysOps agent designed to navigate, repair, and secure complex environments. Prior to 9.0.3, the P2P terminal sharing feature (share start) opens a TCP socket on port 5757 without any authentication mechanism. Any remote attacker can connect to this port using a simple socket script. An attacker who connects to a ZAI-Shell P2P session running in --no-ai mode can send arbitrary system commands. If the host user approves the command without reviewing its contents, the command executes directly with the user's privileges, bypassing all Sentinel safety checks. This vulnerability is fixed in 9.0.3.
References
| Link | Resource |
|---|---|
| https://github.com/TaklaXBR/zai-shell/commit/a4ea8525d912f55d6e2f09b2869966c52d189a4a | Patch |
| https://github.com/TaklaXBR/zai-shell/releases/tag/v9.0.3 | Product Release Notes |
| https://github.com/TaklaXBR/zai-shell/security/advisories/GHSA-6pjj-r955-34rr | Exploit Mitigation Vendor Advisory |
Configurations
History
24 Feb 2026, 18:13
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:taklaxbr:zai_shell:*:*:*:*:*:python:*:* | |
| First Time |
Taklaxbr
Taklaxbr zai Shell |
|
| References | () https://github.com/TaklaXBR/zai-shell/commit/a4ea8525d912f55d6e2f09b2869966c52d189a4a - Patch | |
| References | () https://github.com/TaklaXBR/zai-shell/releases/tag/v9.0.3 - Product, Release Notes | |
| References | () https://github.com/TaklaXBR/zai-shell/security/advisories/GHSA-6pjj-r955-34rr - Exploit, Mitigation, Vendor Advisory | |
| Summary |
|
09 Feb 2026, 22:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-09 22:16
Updated : 2026-02-24 18:13
NVD link : CVE-2026-25807
Mitre link : CVE-2026-25807
CVE.ORG link : CVE-2026-25807
JSON object : View
Products Affected
taklaxbr
- zai_shell
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')
