Jan 2, 2026·5 min read·16 visits
The 'ApexGateway' enterprise API router fails to sanitize the 'X-Debug-Mode' header before passing it to a backend logging script via a system shell. This allows remote, unauthenticated attackers to break out of the command and execute arbitrary code with root privileges. Patch immediately to version 2.4.1.
A critical remote command injection vulnerability in the header parsing logic of ApexGateway allows unauthenticated attackers to execute arbitrary commands as root via a malicious HTTP header.
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H| Product | Affected Versions | Fixed Version |
|---|---|---|
ApexGateway ApexSystems | < 2.4.1 | 2.4.1 |
| Attribute | Detail |
|---|---|
| CWE ID | CWE-78 (OS Command Injection) |
| CVSS v3.1 | 9.8 (Critical) |
| Attack Vector | Network |
| Privileges Required | None |
| User Interaction | None |
| Exploit Status | High (Trivial PoC) |
The software constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.