Skip to content

[Security][API] Potential command injection in translation CLI commands #765

@lhy8888

Description

@lhy8888

Contact Details

security-automation@local

This bug is related to UI or API?

API

What happened?

The translation CLI uses shell command strings for pybabel execution and accepts a user-controlled lang argument. This pattern can become command injection when shell metacharacters are passed.

Expected behavior:

  • Execute pybabel via argument list (no shell string execution)
  • Validate lang against a strict allowlist pattern

Patch prepared:

  • Replaced shell execution with subprocess argument list
  • Added language code validation before execution

Reference branch/commit:

  • Branch: codex/sec-python-rescan-20260308
  • Commit: 5f0137d35

Version

newest

What browsers are you seeing the problem on?

Chrome

Relevant log output

Bandit finding before fix:
- api/commands/common.py:118 B605 HIGH/HIGH
  Starting a process with a shell, possible injection detected.

Metadata

Metadata

Assignees

Labels

No labels
No labels

Type

No type

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions