CVE-2026-22804

based · based Multiple Products

A high-severity vulnerability has been discovered in the based Termix server management platform.

Executive summary

A high-severity vulnerability has been discovered in the based Termix server management platform. This flaw could allow an unauthenticated remote attacker to execute arbitrary commands on the server, potentially leading to a complete system compromise. Successful exploitation could grant an attacker full control over the Termix platform and any servers it manages, posing a significant risk of data theft, service disruption, and further network intrusion.

Vulnerability

The vulnerability is an unauthenticated command injection flaw within the SSH terminal component of the Termix web interface. The application fails to properly sanitize user-supplied input when initiating a new terminal session via a specific API endpoint. An unauthenticated attacker can send a specially crafted HTTP request containing shell metacharacters (e.g., ;, |, &&) to this endpoint, causing the server to execute arbitrary commands with the privileges of the web service account.

Business impact

This vulnerability is rated as High severity with a CVSS score of 8. Exploitation could have a severe impact on business operations, as the Termix platform is a privileged system used to manage critical infrastructure. A successful attack could lead to unauthorized access to sensitive data, modification or deletion of critical files on managed servers, and deployment of malware or ransomware across the environment. This represents a direct threat to data confidentiality, integrity, and availability, and could result in significant financial loss, reputational damage, and operational downtime.

Remediation

Immediate Action: The primary remediation is to apply the security updates provided by the vendor across all affected instances of Termix immediately. After patching, it is crucial to review web server and application access logs for any signs of compromise or attempted exploitation that may have occurred before the patch was applied.

Proactive Monitoring: Implement enhanced monitoring on Termix servers. System administrators should scrutinize web server access logs for unusual requests to API endpoints, particularly those containing shell metacharacters or encoded command strings. Monitor system-level process execution logs on the Termix server for unexpected commands or processes being spawned by the web application's user account.

Compensating Controls: If immediate patching is not feasible, implement the following controls to reduce the risk of exploitation:

  • Restrict network access to the Termix web interface to trusted IP addresses and administrative networks using a firewall.
  • Deploy a Web Application Firewall (WAF) with rules specifically designed to detect and block command injection attack patterns.
  • Ensure the Termix service is running with the lowest possible user privileges to limit the impact of a potential compromise.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the high CVSS score and the critical function of the affected software, this vulnerability requires immediate attention. We strongly recommend that all organizations using the affected based Termix products prioritize the deployment of the vendor-supplied security patch, starting with internet-facing systems. Although this CVE is not currently listed on the CISA KEV catalog, its severity warrants treating it with the same level of urgency. If patching is delayed, the compensating controls listed above should be implemented without delay to mitigate the immediate risk.