Ghidra versions prior to 12.0.3 improperly process annotation directives embedded in automatically extracted binary data, resulting in arbitrary command execution when an analyst interacts with the UI. Specifically, the @execute annotation (which is intended for trusted, user-authored comments) is also parsed in comments generated during auto-analysis (such as CFStrings in Mach-O binaries). This allows a crafted binary to present seemingly benign clickable text which, when clicked, executes attacker-controlled commands on the analyst’s machine.
References
Configurations
No configuration.
History
30 Mar 2026, 15:16
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://takeonme.org/gcves/GCVE-1337-2026-00000000000000000000000000000000000000000000000001011111111111000111111110000000000000000000000000000000000000000000000000000000110 - |
Information
Published : 2026-03-29 20:16
Updated : 2026-03-30 15:16
NVD link : CVE-2026-4946
Mitre link : CVE-2026-4946
CVE.ORG link : CVE-2026-4946
JSON object : View
Products Affected
No product.
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
