CVEReports
CVEReports

Automated vulnerability intelligence platform. Comprehensive reports for high-severity CVEs generated by AI.

Product

  • Home
  • Sitemap
  • RSS Feed

Company

  • About
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CVEReports. All rights reserved.

Made with love by Amit Schendel & Alon Barad



CVE-2026-35533
7.8

CVE-2026-35533: Arbitrary Code Execution via Trust Bypass in mise Configuration Parsing

Amit Schendel
Amit Schendel
Senior Security Researcher

Apr 7, 2026·5 min read·7 visits

PoC Available

Executive Summary (TL;DR)

A logic flaw in mise versions 2026.2.18 through 2026.4.5 allows untrusted local configuration files to mark themselves as trusted. This bypasses security prompts and enables arbitrary code execution when a victim interacts with a malicious repository.

The mise development tool manager is vulnerable to a local arbitrary code execution flaw due to improper access control during configuration parsing. An attacker can bypass the file trust mechanism by supplying a malicious `.mise.toml` that overrides the `trusted_config_paths` directive, leading to the automatic execution of embedded shell commands.

Vulnerability Overview

The mise development tool manager relies on configuration files to orchestrate local development environments. This vulnerability, tracked as CVE-2026-35533, manifests in versions 2026.2.18 through 2026.4.5 due to a logic flaw in the configuration bootstrapping phase.

The root cause is an improper access control implementation (CWE-284) that fails to isolate security-sensitive directives from untrusted configuration sources. When mise encounters a local .mise.toml file, it processes the contents before validating the file's origin against the established trust boundary.

This architectural oversight allows an attacker to manipulate the trust evaluation process itself. By redefining the trusted_config_paths setting within the local file, the malicious configuration grants itself trusted status, enabling the execution of arbitrary commands.

Root Cause Analysis

The vulnerability stems from the specific execution order during the configuration loading phase. The Settings::try_get() function is responsible for preloading settings from local, project-level .mise.toml files.

During this preload phase, the parse_settings_file() function deserializes the TOML payload without first verifying if the file resides in a trusted directory. This creates an initialization race condition where settings used to determine trust are loaded from untrusted sources.

The trust_check() function subsequently evaluates the newly instantiated Settings object. By reading settings.trusted_config_paths(), the system allows the untrusted configuration file to dictate the global trust policy. The system evaluates the attacker's path against the attacker's own provided allowlist.

Code Analysis

The vulnerability is evident in the source file src/config/config_file/mod.rs, where the trust verification loop reads directly from the globally accessible but unverified Settings object. The iteration over settings.trusted_config_paths() unconditionally accepts paths provided by the local .mise.toml.

// Vulnerable code path evaluating trust
let settings = Settings::get();
for p in settings.trusted_config_paths() {
    if canonicalized_path.starts_with(p) {
        add_trusted(canonicalized_path.to_path_buf());
        return true;
    }
}

If the local configuration supplies trusted_config_paths = ["/"], the canonicalized_path.starts_with(p) condition evaluates to true for any file on the filesystem. This guarantees the untrusted file is added to the trusted list.

The patch introduced in version 2026.4.6 resolves this by explicitly filtering security-sensitive configuration keys during the parsing phase. The parse_settings_file function now uses an origin check via config::is_global_config(path) to prevent local files from overriding global settings.

// Patched settings parser
pub fn parse_settings_file(path: &Path) -> Result<SettingsPartial> {
    let raw = file::read_to_string(path)?;
    let settings_file: SettingsFile = toml::from_str(&raw)?;
    let mut settings = settings_file.settings;
 
    // Ensure local/project configs cannot override security settings
    if !config::is_global_config(path) {
        settings.yes = None;
        settings.ci = None;
        settings.trusted_config_paths = None;
        settings.paranoid = None;
    }
 
    Ok(settings)
}

Exploitation Architecture

The attack sequence relies on the victim downloading or cloning a repository containing the malicious configuration file. The following diagram illustrates the execution flow from the malicious file to the compromised shell.

The exploit requires no specialized tools beyond a text editor and an understanding of the TOML syntax used by mise. The attacker relies entirely on the built-in hooks and task execution features of the vulnerable software.

Exploitation Methodology

Exploitation requires an attacker to convince a victim to interact with a directory containing a maliciously crafted .mise.toml file. This interaction typically occurs when a developer clones an untrusted git repository and navigates into it while their shell is configured to use mise hooks.

The attacker constructs a configuration file containing two primary sections. The [settings] block redefines trusted_config_paths to include the filesystem root (/), bypassing the prompt. The [env] block defines the payload script.

[settings]
trusted_config_paths = ["/"]
 
[env]
_.source = ["./poc.sh"]

When the victim's shell executes a mise hook, such as mise hook-env -s bash --force, the tool processes the local configuration. It reads the manipulated trust settings, trusts the file, and blindly executes the directives in _.source, achieving arbitrary code execution.

#!/usr/bin/env bash
echo "Vulnerability Executed" > /tmp/mise-proof.txt

Impact Assessment

The vulnerability yields arbitrary code execution with the privileges of the user running mise. This grants the attacker full access to the victim's local files, environment variables, SSH keys, and active authentication tokens.

The CVSS v3.1 vector evaluates to 7.8 (High) via CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H. The complexity is marked High (AC:H) because the exploit relies on the victim navigating to the specific directory while shell hooks are active.

While categorized as a local attack vector (AV:L), the delivery mechanism frequently involves remote untrusted repositories. The scope change (S:C) reflects the transition from a configuration parsing vulnerability into shell-level command execution context.

Remediation and Mitigation

The primary remediation strategy is upgrading the mise binary to version 2026.4.6 or later. This release permanently removes the ability for local configuration files to override global security settings by nullifying sensitive fields during parsing.

Users can upgrade their installation by executing the command mise self-update. Following the update, the version should be verified by running mise --version to ensure the patch applied successfully.

As a defense-in-depth measure, developers should audit their global ~/.config/mise/config.toml file to ensure no unauthorized paths are persistently trusted. Strict caution is advised when cloning unfamiliar repositories, regardless of the active toolchain.

Official Patches

jdxOfficial Security Advisory and Patch Details

Fix Analysis (1)

Technical Appendix

CVSS Score
7.8/ 10
CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H

Affected Systems

mise development tool manager

Affected Versions Detail

Product
Affected Versions
Fixed Version
mise
jdx
2026.2.18 - 2026.4.52026.4.6
AttributeDetail
CWE IDCWE-284
Attack VectorLocal
CVSS v3.17.8
ImpactArbitrary Code Execution
Exploit StatusPoC Available

MITRE ATT&CK Mapping

T1204.002User Execution: Malicious File
Execution
T1059.004Command and Scripting Interpreter: Unix Shell
Execution
CWE-284
Improper Access Control

Improper Access Control allows local configuration files to override global trust policies.

Known Exploits & Detection

Security Advisory PoCProof of concept demonstrating local arbitrary code execution via manipulated trust paths.

Vulnerability Timeline

Vulnerability introduced (Regression in v2026.2.18)
2026-02-18
Maintainers alerted; version 2026.3.17 confirmed vulnerable
2026-03-27
Security Advisory GHSA-436v-8fw5-4mj8 published
2026-04-03
CVE-2026-35533 formally assigned and published
2026-04-07

References & Sources

  • [1]GitHub Security Advisory GHSA-436v-8fw5-4mj8
  • [2]NVD Record for CVE-2026-35533
  • [3]mise Official Repository

Attack Flow Diagram

Press enter or space to select a node. You can then use the arrow keys to move the node around. Press delete to remove it and escape to cancel.
Press enter or space to select an edge. You can then press delete to remove it or escape to cancel.