CVE-2026-33310

Intake is a package for finding, investigating, loading and disseminating data. Prior to version 2.0.9, the shell() syntax within parameter default values appears to be automatically expanded during the catalog parsing process. If a catalog contains a parameter default such as shell(<command>), the command may be executed when the catalog source is accessed. This means that if a user loads a malicious catalog YAML, embedded commands could execute on the host system. Version 2.0.9 mitigates the issue by making getshell False by default everywhere.
Configurations

Configuration 1 (hide)

cpe:2.3:a:intake:intake:*:*:*:*:*:*:*:*

History

25 Mar 2026, 20:54

Type Values Removed Values Added
References () https://github.com/intake/intake/commit/d0c0b6b57c1cb3f73880655ded4a9b0e18e1fd1b - () https://github.com/intake/intake/commit/d0c0b6b57c1cb3f73880655ded4a9b0e18e1fd1b - Patch
References () https://github.com/intake/intake/security/advisories/GHSA-37g4-qqqv-7m99 - () https://github.com/intake/intake/security/advisories/GHSA-37g4-qqqv-7m99 - Exploit, Vendor Advisory
First Time Intake intake
Intake
CPE cpe:2.3:a:intake:intake:*:*:*:*:*:*:*:*

24 Mar 2026, 14:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-24 14:16

Updated : 2026-03-25 20:54


NVD link : CVE-2026-33310

Mitre link : CVE-2026-33310

CVE.ORG link : CVE-2026-33310


JSON object : View

Products Affected

intake

  • intake
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

CWE-94

Improper Control of Generation of Code ('Code Injection')