{"id":"CVE-2023-38198","details":"acme.sh before 3.0.6 runs arbitrary commands from a remote server via eval, as exploited in the wild in June 2023.","modified":"2026-04-02T09:08:05.474068Z","published":"2023-07-13T03:15:09.977Z","references":[{"type":"ADVISORY","url":"https://news.ycombinator.com/item?id=36254093"},{"type":"ADVISORY","url":"https://www.reddit.com/r/netsec/comments/144ygg7/acmesh_runs_arbitrary_commands_from_a_remote/"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2023/07/13/1"},{"type":"ADVISORY","url":"https://github.com/acmesh-official/acme.sh/releases/tag/3.0.6"},{"type":"ADVISORY","url":"https://groups.google.com/a/mozilla.org/g/dev-security-policy/c/heXVr8o83Ys"},{"type":"ADVISORY","url":"https://news.ycombinator.com/item?id=36252310"},{"type":"REPORT","url":"https://github.com/acmesh-official/acme.sh/issues/4659"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/acmesh-official/acme.sh","events":[{"introduced":"0"},{"fixed":"b7caf7a0165d80dd1556b16057a06bb32025066d"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"3.0.6"}]}}],"versions":["1.2.2","1.2.3","2.0.2","2.2.9","2.3.0","2.5.2","2.6.0","2.6.4","2.6.5","2.6.6","2.6.8","2.7.1","2.7.2","2.7.3","2.7.4","2.7.5","2.7.6","2.7.7","2.7.8","2.7.9","2.8.0","2.8.1","2.8.2","2.8.3","2.8.4","2.8.5","2.8.6","2.8.7","2.8.8","2.8.9","2.9.0","3.0.0","3.0.1","3.0.2","3.0.3","3.0.4","3.0.5","v2.6.9","v3.0.5"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-38198.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}