[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"repo-stars":3,"vuln-CVE-2026-9277":6},{"stargazers_count":4,"fetched_at":5},6,"2026-05-22T16:08:08.064Z",{"id":7,"descriptions":8,"cisa":9,"weaknesses":10,"exploits":75,"aliases":76,"duplicate_of":9,"upstream":77,"downstream":78,"duplicates":79,"related":80,"reserved_at":9,"published_at":81,"modified_at":82,"state":83,"summary":84,"references_raw":91,"kevs":111,"epss":9,"epss_history":112,"metrics":113,"affected":123},"CVE-2026-9277","shell-quote's `quote()` function did not validate object-token inputs against the operator model used by `parse()`. The `.op` field was backslash-escaped character by character using `/(.)/g`, which in JavaScript does not match line terminators (\\n, \\r, U+2028, U+2029). A line terminator in `.op` therefore passed through unescaped into the output; POSIX shells treat a literal newline as a command separator, so any content after it would execute as a second command. The vulnerable code path is reachable in two ways: (1) direct construction of `{ op: '...\\n...' }` from external input, and (2) via `parse(cmd, envFn)` when `envFn` returns object tokens whose `.op` is attacker-influenced. Both are documented API surface. Fixed by replacing the per-character escape with strict shape validation: `.op` must match the parser's control-operator allowlist; `{ op: 'glob', pattern }` validates `pattern` and forbids line terminators; `{ comment }` validates `comment` and forbids line terminators; any other object shape throws `TypeError`.",null,[11,40],{"_key":12,"id":12,"name":13,"description":14,"type":15,"status":16,"abstraction":17,"likelihood_of_exploit":18,"capec":19},"CWE-78","Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')","The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.","weakness","Stable","Base","High",[20,24,28,32,36],{"id":21,"name":22,"techniques":23},"CAPEC-108","Command Line Execution through SQL Injection",[],{"id":25,"name":26,"techniques":27},"CAPEC-15","Command Delimiters",[],{"id":29,"name":30,"techniques":31},"CAPEC-43","Exploiting Multiple Input Interpretation Layers",[],{"id":33,"name":34,"techniques":35},"CAPEC-6","Argument Injection",[],{"id":37,"name":38,"techniques":39},"CAPEC-88","OS Command Injection",[],{"_key":41,"id":41,"name":42,"description":43,"type":15,"status":44,"abstraction":45,"likelihood_of_exploit":18,"capec":46},"CWE-77","Improper Neutralization of Special Elements used in a Command ('Command Injection')","The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.","Draft","Class",[47,51,53,57,61,65,67,71],{"id":48,"name":49,"techniques":50},"CAPEC-136","LDAP Injection",[],{"id":25,"name":26,"techniques":52},[],{"id":54,"name":55,"techniques":56},"CAPEC-183","IMAP/SMTP Command Injection",[],{"id":58,"name":59,"techniques":60},"CAPEC-248","Command Injection",[],{"id":62,"name":63,"techniques":64},"CAPEC-40","Manipulating Writeable Terminal Devices",[],{"id":29,"name":30,"techniques":66},[],{"id":68,"name":69,"techniques":70},"CAPEC-75","Manipulating Writeable Configuration Files",[],{"id":72,"name":73,"techniques":74},"CAPEC-76","Manipulating Web Input to File System Calls",[],[],[],[],[],[],[],"2026-05-22T13:22:38.873Z","2026-05-22T14:17:39.549Z","PUBLISHED",{"cisa_kev":85,"cisa_ransomware":85,"cisa_vendor":9,"epss_severity":9,"epss_score":9,"severity":86,"severity_score":87,"severity_version":88,"severity_source":89,"severity_vector":90,"severity_status":83},false,"critical",9.2,"v4.0","cve.org","CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",[92,97,102,107],{"url":93,"sources":94,"tags":95},"https://github.com/ljharb/shell-quote/security/advisories/GHSA-w7jw-789q-3m8p",[89],[96],"Vendor Advisory",{"url":98,"sources":99,"tags":100},"https://github.com/ljharb/shell-quote/commit/1518179",[89],[101],"Patch",{"url":103,"sources":104,"tags":105},"https://github.com/ljharb/shell-quote",[89],[106],"Product",{"url":108,"sources":109,"tags":110},"https://www.npmjs.com/package/shell-quote",[89],[106],[],[],[114],{"source":89,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":115,"cvss_v4_0":121},{"baseScore":116,"baseSeverity":117,"vectorString":118,"impactScore":119,"exploitabilityScore":120},8.1,"HIGH","CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",9.8,5.6,{"baseScore":87,"baseSeverity":122,"vectorString":90,"impactScore":9,"exploitabilityScore":9},"CRITICAL",[]]