Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

832+ Articles
121+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. Security
  3. CVE-2026-30352: Remote Code Execution in leonvanzyl Autocoder via /devserver/start Command Injection (CVSS 9.8)
CVE-2026-30352: Remote Code Execution in leonvanzyl Autocoder via /devserver/start Command Injection (CVSS 9.8)

Critical Security Alert

This vulnerability is actively being exploited. Immediate action is recommended.

SECURITYCRITICALCVE-2026-30352

CVE-2026-30352: Remote Code Execution in leonvanzyl Autocoder via /devserver/start Command Injection (CVSS 9.8)

A critical remote code execution vulnerability in the /devserver/start endpoint of the leonvanzyl autocoder AI coding tool allows unauthenticated attackers to execute arbitrary OS commands by supplying a crafted command parameter. CVSS 9.8.

Dylan H.

Security Team

April 28, 2026
6 min read

Affected Products

  • leonvanzyl/autocoder commit 79d02a and earlier

Executive Summary

CVE-2026-30352 is a critical remote code execution (RCE) vulnerability in leonvanzyl/autocoder, an AI-assisted coding tool hosted on GitHub. The flaw resides in the /devserver/start HTTP endpoint, which accepts a command parameter that is passed to the OS shell without sanitization. Any attacker with network access to the development server can execute arbitrary commands on the underlying host.

The vulnerability carries a CVSS score of 9.8 (Critical) and requires no authentication, no user interaction, and minimal attack complexity. Organizations or individuals running the affected commit should disable the dev server or apply the fix immediately.


Vulnerability Overview

AttributeValue
CVE IDCVE-2026-30352
CVSS Score9.8 (Critical)
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWECWE-78 — Improper Neutralization of Special Elements used in an OS Command
TypeRemote Code Execution via OS Command Injection
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
Patch AvailableCheck upstream repository
NVD Published2026-04-27

Affected Versions

ProductAffectedFixed
leonvanzyl/autocodercommit 79d02a and earlierCheck upstream for patch

Technical Analysis

What Is Autocoder?

autocoder (leonvanzyl/autocoder) is an open-source AI-assisted coding and code generation tool. Projects of this type typically expose local HTTP development server endpoints to facilitate real-time interaction between the IDE, the local AI inference layer, and developer tooling. The /devserver/start endpoint is part of this local service layer.

The Vulnerability

The /devserver/start endpoint accepts a command parameter via an HTTP request. The server-side implementation takes the value of this parameter and concatenates it directly into a shell invocation without any sanitization, allowlisting, or parameterized subprocess call. This is a classic OS command injection (CWE-78) pattern.

Because no input filtering is applied, an attacker can append shell metacharacters (;, &, |, $()) to inject additional commands. The injected payload executes with the same privileges as the autocoder dev server process.

Attack Flow

1. Attacker identifies a host running leonvanzyl/autocoder dev server (default port exposed)
2. Attacker sends HTTP request to /devserver/start with a crafted command parameter
3. Server passes the unsanitized parameter to the OS shell
4. Attacker achieves arbitrary code execution with the privileges of the running process
5. From there: data exfiltration, persistence, lateral movement, or supply chain injection

Why CVSS 9.8

MetricValueReason
No authenticationPR:NThe endpoint requires no credentials
No user interactionUI:NFully automated exploitation
Network-reachableAV:NAny host with network access to the dev server is at risk
Full C/I/A impactH/H/HArbitrary command execution yields complete host compromise

Impact Assessment

Impact AreaDescription
Developer Host CompromiseFull RCE on the developer's machine running autocoder
Source Code TheftAttacker gains access to all code and credentials in the working directory
Supply Chain RiskCompromised developer machine can be used to inject malicious code into repositories
Credential ExposureSSH keys, API tokens, cloud credentials, and .env files may be exfiltrated
PersistenceAttacker can install backdoors or SSH keys for continued access
Lateral MovementAccess to developer machine enables targeting of internal networks and CI/CD pipelines

Risk Context: AI Dev Tools as Attack Surface

AI-assisted coding tools running local HTTP servers represent an emerging attack surface. Developer machines typically hold privileged access to:

  • Source code repositories and signing keys
  • Cloud provider credentials (AWS, GCP, Azure)
  • Internal infrastructure credentials (databases, CI/CD tokens)
  • Customer data in local development environments

A single RCE on a developer machine can enable supply chain attacks far exceeding the initial scope of the vulnerability.


Remediation

Immediate Actions

  1. Stop the autocoder dev server if it is not actively needed
  2. Restrict network access — ensure the dev server binds to 127.0.0.1 only, not 0.0.0.0
  3. Check the upstream repository for a patched commit and update immediately
  4. Audit your development machine for signs of unauthorized access if the server was publicly reachable

Firewall Mitigation (Linux)

# Block external access to the dev server port (adjust port as needed)
sudo ufw deny from any to any port <devserver_port>
sudo ufw allow from 127.0.0.1 to any port <devserver_port>

Secure Dev Server Binding

If you operate the server, ensure it binds to localhost only:

# Secure pattern — bind to loopback only
app.run(host="127.0.0.1", port=<port>)

Secure Command Execution (Fix Pattern)

The underlying fix requires replacing direct shell string interpolation with a parameterized subprocess call using subprocess.run with a list of arguments rather than a shell string. This prevents any injected metacharacters from being interpreted by the shell.


Detection Indicators

IndicatorDescription
Unexpected HTTP requests to /devserver/start from non-localhost IPsExploitation attempt
Shell metacharacters in request logs (`; &`)
Unusual child processes spawned by the dev server processSuccessful exploitation
New files, cron jobs, or SSH keys on developer machinePost-exploitation persistence
Outbound connections to unknown IPs from developer hostData exfiltration or C2 beaconing

Post-Remediation Checklist

  1. Update autocoder to a patched version as soon as one is available
  2. Bind all dev servers to 127.0.0.1 — never expose them on 0.0.0.0
  3. Audit web server logs for suspicious requests to /devserver/start
  4. Rotate any credentials that may have been accessible on the compromised machine
  5. Review recent repository commits for unexpected changes if the machine was reachable
  6. Scan for persistence artifacts (new cron jobs, SSH keys, scheduled tasks)
  7. Network-segment developer machines from production infrastructure where possible

References

  • NVD — CVE-2026-30352
  • leonvanzyl/autocoder on GitHub
  • CWE-78 — OS Command Injection
  • OWASP Command Injection
#CVE-2026-30352#autocoder#RCE#Command Injection#AI Tooling#Development Tools#Supply Chain

Related Articles

CVE-2026-6951: simple-git RCE via --config Option Bypass (CVSS 9.8)

A critical remote code execution vulnerability in the simple-git npm package allows attackers to inject arbitrary git config options via the --config...

6 min read

CVE-2026-6942: radare2-mcp OS Command Injection via Shell Metacharacter Filter Bypass

A critical OS command injection vulnerability in radare2-mcp 1.6.0 and earlier allows remote attackers to execute arbitrary commands by bypassing the...

5 min read

CVE-2025-15379: MLflow Command Injection in Model Serving (CVSS 10.0)

A maximum-severity command injection vulnerability in MLflow's model serving container initialization allows attackers to execute arbitrary OS commands...

6 min read
Back to all Security Alerts