CVE-2026-39087

Ntfy · ntfy.sh

A vulnerability in the `parseActions` function of ntfy.sh allows remote attackers to execute arbitrary code.

Executive summary

A critical code execution vulnerability in ntfy.sh allows unauthenticated remote attackers to compromise the server by exploiting the parseActions function.

Vulnerability

The parseActions function incorrectly handles user-supplied data, leading to a vulnerability that allows for arbitrary code execution. This can be triggered by a remote attacker without authentication.

Business impact

With a CVSS score of 9.8, this flaw represents a significant risk to any infrastructure running ntfy.sh. Exploitation allows an attacker to gain control over the server, potentially leading to unauthorized data access and service disruption.

Remediation

Immediate Action: Update ntfy.sh to version 2.21 or later.

Proactive Monitoring: Review server logs for suspicious activity and monitor for unexpected outbound network connections from the ntfy service.

Compensating Controls: Implement network-level access controls to limit exposure of the ntfy service to trusted users.

Exploitation status

Public Exploit Available: No

Analyst recommendation

The ability for an unauthenticated attacker to execute arbitrary code makes this a top-priority item. Administrators must update the software immediately to protect against potential remote exploitation.