CVE-2026-35197

dye is a portable and respectful color library for shell scripts. Prior to 1.1.1, certain dye template expressions would result in execution of arbitrary code. This issue was discovered and fixed by dye's author, and is not known to be exploited. This vulnerability is fixed in 1.1.1.
Configurations

Configuration 1 (hide)

cpe:2.3:a:mattiebee:dye:1.1.0:*:*:*:*:*:*:*

History

16 Apr 2026, 04:13

Type Values Removed Values Added
References () https://github.com/mattieb/dye/security/advisories/GHSA-3v4r-5vfh-3wjr - () https://github.com/mattieb/dye/security/advisories/GHSA-3v4r-5vfh-3wjr - Vendor Advisory
References () https://mattiebee.io/dye-template-advisory - () https://mattiebee.io/dye-template-advisory - Exploit, Vendor Advisory
CPE cpe:2.3:a:mattiebee:dye:1.1.0:*:*:*:*:*:*:*
First Time Mattiebee
Mattiebee dye

06 Apr 2026, 20:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-06 20:16

Updated : 2026-04-16 04:13


NVD link : CVE-2026-35197

Mitre link : CVE-2026-35197

CVE.ORG link : CVE-2026-35197


JSON object : View

Products Affected

mattiebee

  • dye
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')