Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-34430— ByteDance DeerFlow LocalSandboxProvider Host Bash Escape

CVSS 8.8 · High EPSS 0.11% · P29
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-34430

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
ByteDance DeerFlow LocalSandboxProvider Host Bash Escape
Source: NVD (National Vulnerability Database)
Vulnerability Description
ByteDance Deer-Flow versions prior to commit 92c7a20 contain a sandbox escape vulnerability in bash tool handling that allows attackers to execute arbitrary commands on the host system by bypassing regex-based validation using shell features such as directory changes and relative paths. Attackers can exploit the incomplete shell semantics modeling to read and modify files outside the sandbox boundary and achieve arbitrary command execution through subprocess invocation with shell interpretation enabled.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
不完整的黑名单
Source: NVD (National Vulnerability Database)
Vulnerability Title
DeerFlow 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
DeerFlow是Bytedance开源的一个开源智能体编排框架,用于协调子代理与技能执行。 DeerFlow 92c7a20之前版本存在安全漏洞,该漏洞源于bash工具处理中存在沙箱逃逸,攻击者可通过利用目录更改和相对路径等shell功能绕过基于正则表达式的验证,在主机系统上执行任意命令,可能导致读取和修改沙箱边界外的文件并通过启用shell解释的子进程调用实现任意命令执行。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
Bytedance Inc.DeerFlow 0 ~ 92c7a20cb74addc3038d2131da78f2e239ef542e -

II. Public POCs for CVE-2026-34430

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium
Qwen3.6-35B-A3B · 8962 chars
Paid plan includes:
In-depth vulnerability mechanism
Trigger conditions & impact
Full executable POC code
Exploit chain & mitigation
POC zip download
100+ AI POC generations per month

III. Intelligence Information for CVE-2026-34430

登录查看更多情报信息。

IV. Related Vulnerabilities

V. Comments for CVE-2026-34430

No comments yet


Leave a comment