{"id":"CVE-2022-21186","details":"The package @acrontum/filesystem-template before 0.0.2 are vulnerable to Arbitrary Command Injection due to the fetchRepo API missing sanitization of the href field of external input.","aliases":["GHSA-m2fc-9h5m-29cm"],"modified":"2026-03-14T11:22:49.018269Z","published":"2022-08-05T05:15:07.147Z","references":[{"type":"FIX","url":"https://github.com/acrontum/filesystem-template/pull/14/commits/baeb727b60991ad82d9e63ac660883793abc0acc"},{"type":"EVIDENCE","url":"https://security.snyk.io/vuln/SNYK-JS-ACRONTUMFILESYSTEMTEMPLATE-2419071"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/acrontum/filesystem-template","events":[{"introduced":"0"},{"fixed":"55d6389dc6a9714231c5c68e54cba196712e3612"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"0.0.2"}]}}],"versions":["0.0.1"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-21186.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}