CVE-2026-39862

Tophat is a mobile applications testing harness. Prior to 2.5.1, Tophat is affected by remote code execution via crafted tophat:// or http://localhost:29070 URLs. The arguments query parameter flows unsanitized from URL parsing through to /bin/bash -c execution, allowing an attacker to execute arbitrary commands on a developer's macOS workstation. Any developer with Tophat installed is vulnerable. For previously trusted build hosts, no confirmation dialog appears. Attacker commands run with the user's permissions. This vulnerability is fixed in 2.5.1.
Configurations

Configuration 1 (hide)

cpe:2.3:a:shopify:tophat:*:*:*:*:*:*:*:*

History

20 Apr 2026, 14:39

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8
First Time Shopify
Shopify tophat
CPE cpe:2.3:a:shopify:tophat:*:*:*:*:*:*:*:*
References () https://github.com/Shopify/tophat/pull/139 - () https://github.com/Shopify/tophat/pull/139 - Issue Tracking
References () https://github.com/Shopify/tophat/security/advisories/GHSA-8x8g-6rv5-mgg2 - () https://github.com/Shopify/tophat/security/advisories/GHSA-8x8g-6rv5-mgg2 - Vendor Advisory

08 Apr 2026, 20:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-08 20:16

Updated : 2026-04-20 14:39


NVD link : CVE-2026-39862

Mitre link : CVE-2026-39862

CVE.ORG link : CVE-2026-39862


JSON object : View

Products Affected

shopify

  • tophat
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')