{"id":"CVE-2023-28617","details":"org-babel-execute:latex in ob-latex.el in Org Mode through 9.6.1 for GNU Emacs allows attackers to execute arbitrary commands via a file name or directory name that contains shell metacharacters.","modified":"2026-04-16T04:34:45.918675067Z","published":"2023-03-19T03:15:11.747Z","related":["ALSA-2023:1930","ALSA-2023:2074","ALSA-2023:2626","ALSA-2023:3104"],"references":[{"type":"WEB","url":"https://list.orgmode.org/tencent_04CF842704737012CCBCD63CD654DD41CA0A%40qq.com/T/#m6ef8e7d34b25fe17b4cbb655b161edce18c6655e"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2023/05/msg00008.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00019.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/02/msg00033.html"},{"type":"FIX","url":"https://git.savannah.gnu.org/cgit/emacs/org-mode.git/commit/?id=a8006ea580ed74f27f974d60b598143b04ad1741"},{"type":"FIX","url":"https://git.savannah.gnu.org/cgit/emacs/org-mode.git/commit/?id=8f8ec2ccf3f5ef8f38d68ec84a7e4739c45db485"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"9.6.1"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-28617.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}