ByteDance Deer-Flow versions prior to commit 92c7a20 contain a sandbox escape vulnerability in bash tool handling that allows attackers to execute arbitrary commands on the host system by bypassing regex-based validation using shell features such as directory changes and relative paths. Attackers can exploit the incomplete shell semantics modeling to read and modify files outside the sandbox boundary and achieve arbitrary command execution through subprocess invocation with shell interpretation enabled.

Project Subscriptions

Vendors Products
Bytedance Subscribe
Deerflow Subscribe
Deerflow Subscribe
Deerflow Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Bytedance
Bytedance deerflow
Deerflow
Deerflow deerflow
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:a:deerflow:deerflow:*:*:*:*:*:*:*:*
Vendors & Products Bytedance
Bytedance deerflow
Deerflow
Deerflow deerflow

Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description ByteDance Deer-Flow versions prior to commit 92c7a20 contain a sandbox escape vulnerability in bash tool handling that allows attackers to execute arbitrary commands on the host system by bypassing regex-based validation using shell features such as directory changes and relative paths. Attackers can exploit the incomplete shell semantics modeling to read and modify files outside the sandbox boundary and achieve arbitrary command execution through subprocess invocation with shell interpretation enabled.
Title ByteDance DeerFlow LocalSandboxProvider Host Bash Escape
Weaknesses CWE-184
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.6, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-04-01T15:01:25.156Z

Reserved: 2026-03-27T15:24:06.752Z

Link: CVE-2026-34430

cve-icon Vulnrichment

Updated: 2026-04-01T14:53:17.031Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-01T14:16:52.773

Modified: 2026-04-02T19:41:55.973

Link: CVE-2026-34430

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-02T20:17:34Z

Weaknesses