WebdriverIO is a test automation framework for unit, e2e and component testing using WebDriver, WebDriver BiDi and Appium. Versions below 9.24.0 contain a command injection vulnerability leading to remote code execution (RCE) in test orchestration. Git permits branch names containing shell metacharacters, and getGitMetadataForAISelection() interpolates these names directly into execSync() calls without sanitization. An attacker can exploit this by supplying a malicious repository (via testOrchestrationOptions.runSmartSelection.source, or the current directory if unset) whose branch name carries a payload, causing the shell to execute arbitrary code. This enables remote code execution on CI/CD servers and developer machines, leading to credential and secret disclosure, source code and SSH key exfiltration, system compromise, and supply chain attacks via tampered build artifacts. The issue has been fixed in version 9.24.0.

Project Subscriptions

Vendors Products
Openjsf Subscribe
Webdriverio Subscribe
Webdriverio Subscribe
Webdriverio Subscribe
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-5c46-x3qw-q7j7 WebdriverIO BrowserStack Service has a Command Injection issue
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 22 May 2026 00:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Important


Tue, 19 May 2026 21:15:00 +0000

Type Values Removed Values Added
First Time appeared Openjsf
Openjsf webdriverio
CPEs cpe:2.3:a:openjsf:webdriverio:*:*:*:*:*:node.js:*:*
Vendors & Products Openjsf
Openjsf webdriverio

Tue, 19 May 2026 13:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 19 May 2026 08:45:00 +0000

Type Values Removed Values Added
First Time appeared Webdriverio
Webdriverio webdriverio
Vendors & Products Webdriverio
Webdriverio webdriverio

Mon, 18 May 2026 20:45:00 +0000

Type Values Removed Values Added
Description WebdriverIO is a test automation framework for unit, e2e and component testing using WebDriver, WebDriver BiDi and Appium. Versions below 9.24.0 contain a command injection vulnerability leading to remote code execution (RCE) in test orchestration. Git permits branch names containing shell metacharacters, and getGitMetadataForAISelection() interpolates these names directly into execSync() calls without sanitization. An attacker can exploit this by supplying a malicious repository (via testOrchestrationOptions.runSmartSelection.source, or the current directory if unset) whose branch name carries a payload, causing the shell to execute arbitrary code. This enables remote code execution on CI/CD servers and developer machines, leading to credential and secret disclosure, source code and SSH key exfiltration, system compromise, and supply chain attacks via tampered build artifacts. The issue has been fixed in version 9.24.0.
Title WebdriverIO has Command Injection in the BrowserStack Service
Weaknesses CWE-78
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-05-19T12:58:50.420Z

Reserved: 2026-01-30T14:44:47.330Z

Link: CVE-2026-25244

cve-icon Vulnrichment

Updated: 2026-05-19T12:58:24.614Z

cve-icon NVD

Status : Analyzed

Published: 2026-05-18T21:16:39.547

Modified: 2026-05-19T21:08:29.203

Link: CVE-2026-25244

cve-icon Redhat

Severity : Important

Publid Date: 2026-05-18T20:31:14Z

Links: CVE-2026-25244 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-19T08:18:37Z

Weaknesses