Intake is a package for finding, investigating, loading and disseminating data. Prior to version 2.0.9, the shell() syntax within parameter default values appears to be automatically expanded during the catalog parsing process. If a catalog contains a parameter default such as shell(<command>), the command may be executed when the catalog source is accessed. This means that if a user loads a malicious catalog YAML, embedded commands could execute on the host system. Version 2.0.9 mitigates the issue by making getshell False by default everywhere.
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-37g4-qqqv-7m99 Intake has a Command Injection via shell() Expansion in Parameter Defaults
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 24 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 24 Mar 2026 13:45:00 +0000

Type Values Removed Values Added
Description Intake is a package for finding, investigating, loading and disseminating data. Prior to version 2.0.9, the shell() syntax within parameter default values appears to be automatically expanded during the catalog parsing process. If a catalog contains a parameter default such as shell(<command>), the command may be executed when the catalog source is accessed. This means that if a user loads a malicious catalog YAML, embedded commands could execute on the host system. Version 2.0.9 mitigates the issue by making getshell False by default everywhere.
Title Intake has a Command Injection via shell() Expansion in Parameter Defaults
Weaknesses CWE-78
CWE-94
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-24T15:36:17.300Z

Reserved: 2026-03-18T21:23:36.676Z

Link: CVE-2026-33310

cve-icon Vulnrichment

Updated: 2026-03-24T15:36:07.105Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-24T14:16:30.130

Modified: 2026-03-24T15:53:48.067

Link: CVE-2026-33310

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses