Tophat is a mobile applications testing harness. Prior to 2.5.1, Tophat is affected by remote code execution via crafted tophat:// or http://localhost:29070 URLs. The arguments query parameter flows unsanitized from URL parsing through to /bin/bash -c execution, allowing an attacker to execute arbitrary commands on a developer's macOS workstation. Any developer with Tophat installed is vulnerable. For previously trusted build hosts, no confirmation dialog appears. Attacker commands run with the user's permissions. This vulnerability is fixed in 2.5.1.
References
| Link | Resource |
|---|---|
| https://github.com/Shopify/tophat/pull/139 | Issue Tracking |
| https://github.com/Shopify/tophat/security/advisories/GHSA-8x8g-6rv5-mgg2 | Vendor Advisory |
Configurations
History
20 Apr 2026, 14:39
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
| First Time |
Shopify
Shopify tophat |
|
| CPE | cpe:2.3:a:shopify:tophat:*:*:*:*:*:*:*:* | |
| References | () https://github.com/Shopify/tophat/pull/139 - Issue Tracking | |
| References | () https://github.com/Shopify/tophat/security/advisories/GHSA-8x8g-6rv5-mgg2 - Vendor Advisory |
08 Apr 2026, 20:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-08 20:16
Updated : 2026-04-20 14:39
NVD link : CVE-2026-39862
Mitre link : CVE-2026-39862
CVE.ORG link : CVE-2026-39862
JSON object : View
Products Affected
shopify
- tophat
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
