systeminformation is a System and OS information library for node.js. In versions prior to 5.30.8, a command injection vulnerability in the `wifiNetworks()` function allows an attacker to execute arbitrary OS commands via an unsanitized network interface parameter in the retry code path. In `lib/wifi.js`, the `wifiNetworks()` function sanitizes the `iface` parameter on the initial call (line 437). However, when the initial scan returns empty results, a `setTimeout` retry (lines 440-441) calls `getWifiNetworkListIw(iface)` with the **original unsanitized** `iface` value, which is passed directly to `execSync('iwlist ${iface} scan')`. Any application passing user-controlled input to `si.wifiNetworks()` is vulnerable to arbitrary command execution with the privileges of the Node.js process. Version 5.30.8 fixes the issue.
References
Configurations
History
20 Feb 2026, 20:10
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Systeminformation
Systeminformation systeminformation |
|
| CPE | cpe:2.3:a:systeminformation:systeminformation:*:*:*:*:*:node.js:*:* | |
| References | () https://github.com/sebhildebrandt/systeminformation/commit/22242aa56188f2bffcbd7d265a11e1ebb808b460 - Patch | |
| References | () https://github.com/sebhildebrandt/systeminformation/security/advisories/GHSA-9c88-49p5-5ggf - Exploit, Vendor Advisory |
19 Feb 2026, 20:25
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-19 20:25
Updated : 2026-02-20 20:10
NVD link : CVE-2026-26280
Mitre link : CVE-2026-26280
CVE.ORG link : CVE-2026-26280
JSON object : View
Products Affected
systeminformation
- systeminformation
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
