CVE-2026-34243

wenxian is a tool to generate BIBTEX files from given identifiers (DOI, PMID, arXiv ID, or paper title). In versions 0.3.1 and prior, a GitHub Actions workflow uses untrusted user input from issue_comment.body directly inside a shell command, allowing potential command injection and arbitrary code execution on the runner. At time of publication, there are no publicly available patches.
References
Link Resource
https://github.com/njzjz/wenxian/security/advisories/GHSA-r4fj-r33x-8v88 Exploit Mitigation Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:njzjz:wenxian:*:*:*:*:*:python:*:*

History

03 Apr 2026, 14:38

Type Values Removed Values Added
CPE cpe:2.3:a:njzjz:wenxian:*:*:*:*:*:python:*:*
First Time Njzjz wenxian
Njzjz
References () https://github.com/njzjz/wenxian/security/advisories/GHSA-r4fj-r33x-8v88 - () https://github.com/njzjz/wenxian/security/advisories/GHSA-r4fj-r33x-8v88 - Exploit, Mitigation, Vendor Advisory

31 Mar 2026, 16:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-31 16:16

Updated : 2026-04-03 14:38


NVD link : CVE-2026-34243

Mitre link : CVE-2026-34243

CVE.ORG link : CVE-2026-34243


JSON object : View

Products Affected

njzjz

  • wenxian
CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')

CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')