CVE-2026-33310 in Intakeinfo

Summary

Intake is a package for finding, investigating, loading and disseminating data. Prior to version 2.0.9, the shell() syntax within parameter default values appears to be automatically expanded during the catalog parsing process. If a catalog contains a parameter default such as shell(<command>), the command may be executed when the catalog source is accessed. This means that if a user loads a malicious catalog YAML, embedded commands could execute on the host system. Version 2.0.9 mitigates the issue by making getshell False by default everywhere.

Responsible

GitHub_M

Reservation

03/18/2026

Disclosure

03/24/2026

Entries

VulDB provides additional information and datapoints for this CVE:

Do you need the next level of professionalism?

Upgrade your account now!