dye is a portable and respectful color library for shell scripts. Prior to 1.1.1, certain dye template expressions would result in execution of arbitrary code. This issue was discovered and fixed by dye's author, and is not known to be exploited. This vulnerability is fixed in 1.1.1.
References
| Link | Resource |
|---|---|
| https://github.com/mattieb/dye/security/advisories/GHSA-3v4r-5vfh-3wjr | Vendor Advisory |
| https://mattiebee.io/dye-template-advisory | Exploit Vendor Advisory |
Configurations
History
16 Apr 2026, 04:13
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/mattieb/dye/security/advisories/GHSA-3v4r-5vfh-3wjr - Vendor Advisory | |
| References | () https://mattiebee.io/dye-template-advisory - Exploit, Vendor Advisory | |
| CPE | cpe:2.3:a:mattiebee:dye:1.1.0:*:*:*:*:*:*:* | |
| First Time |
Mattiebee
Mattiebee dye |
06 Apr 2026, 20:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-06 20:16
Updated : 2026-04-16 04:13
NVD link : CVE-2026-35197
Mitre link : CVE-2026-35197
CVE.ORG link : CVE-2026-35197
JSON object : View
Products Affected
mattiebee
- dye
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')
