CVE-2026-5965: NewSoftOA Critical OS Command Injection
A critical OS command injection vulnerability has been disclosed in NewSoftOA, a product developed by NewSoft. Tracked as CVE-2026-5965 with a CVSS score of 9.8 (Critical), the flaw allows unauthenticated local attackers to inject arbitrary OS commands and have them executed with the privileges of the server process.
Vulnerability Overview
| Attribute | Value |
|---|---|
| CVE ID | CVE-2026-5965 |
| CVSS Score | 9.8 (Critical) |
| CWE Classification | CWE-78 — Improper Neutralization of Special Elements in an OS Command |
| Affected Software | NewSoftOA (NewSoft) |
| Attack Vector | Local |
| Authentication Required | None (unauthenticated) |
| Published | April 21, 2026 |
| Source | NIST NVD |
Technical Description
The vulnerability exists in NewSoftOA, an office automation product by NewSoft. The flaw is classified as OS Command Injection (CWE-78), meaning user-supplied input is passed to a system shell invocation without adequate sanitization or escaping.
An unauthenticated local attacker can exploit this by supplying crafted input containing shell metacharacters (e.g., ;, |, &&), causing the application to run attacker-controlled commands on the underlying OS. Because no authentication is required to reach the vulnerable code path, the attack barrier is extremely low.
Attack Chain (Conceptual)
1. Attacker identifies the vulnerable input field in NewSoftOA
2. Supplies malicious input with shell metacharacters:
field=legitimate_value; ATTACKER_COMMAND
3. NewSoftOA passes the unsanitized value to an OS shell call
4. The OS runs both the intended operation and the injected payload
5. Attacker achieves arbitrary code execution at the service's privilege levelIf NewSoftOA runs as a privileged system account, the attacker gains full system control through this single vulnerability.
Impact Assessment
| Impact Area | Description |
|---|---|
| Confidentiality | Any file readable by the service account is exposed |
| Integrity | Attacker can write files, alter configs, or plant malware |
| Availability | Service disruption, file deletion, or process termination |
| Lateral Movement | Compromised host can pivot further into the local network |
| Persistence | Backdoors, scheduled tasks, or startup entries can be installed |
The CVSS score of 9.8 reflects near-maximum severity: no authentication needed, no user interaction, and full C/I/A compromise.
Affected Products
| Product | Vendor | Status |
|---|---|---|
| NewSoftOA | NewSoft | Vulnerable — patch availability TBD |
Organizations running NewSoftOA should treat this as a high-priority remediation item until a vendor patch is confirmed and deployed.
Remediation Guidance
Immediate Actions
- Identify all instances of NewSoftOA across your environment, especially those on shared workstations or accessible from internal networks.
- Restrict access to the application to authorized users only; limit network exposure where possible.
- Apply vendor patch — contact NewSoft for an updated release that addresses CVE-2026-5965 and apply immediately upon release.
- Least privilege — ensure the NewSoftOA service account has only the minimum OS permissions required to operate, limiting blast radius.
- Monitor for anomalies — watch for unexpected process creation events, unusual outbound network connections, or new files appearing in temp or startup directories on hosts running NewSoftOA.
Detection Indicators
Security teams should monitor for:
- Unexpected child processes spawned from the NewSoftOA process (Windows Event ID 4688 or Linux audit logs)
- Unusual outbound network connections originating from the NewSoftOA host
- New files appearing in temp directories, startup folders, or scheduled task definitions on affected systems
- Privilege escalation events triggered from the NewSoftOA service account
Key Takeaways
- CVE-2026-5965 is a CVSS 9.8 Critical OS command injection in NewSoftOA requiring no authentication to exploit
- Immediate exposure assessment is critical — locate all NewSoftOA deployments in your organization
- Restrict access and enforce least-privilege service accounts while awaiting a vendor patch
- Monitor process, file system, and network activity from affected hosts
- Patch immediately once NewSoft releases a fixed version