Skip to content

[Security][API] Potential command injection in translation CLI commands #765

@lhy8888

Description

@lhy8888

Contact Details

security-automation@local

This bug is related to UI or API?

API

What happened?

The translation CLI uses shell command strings for pybabel execution and accepts a user-controlled lang argument. This pattern can become command injection when shell metacharacters are passed.

Expected behavior:

  • Execute pybabel via argument list (no shell string execution)
  • Validate lang against a strict allowlist pattern

Patch prepared:

  • Replaced shell execution with subprocess argument list
  • Added language code validation before execution

Reference branch/commit:

  • Branch: codex/sec-python-rescan-20260308
  • Commit: 5f0137d35

Version

newest

What browsers are you seeing the problem on?

Chrome

Relevant log output

Bandit finding before fix:
- api/commands/common.py:118 B605 HIGH/HIGH
  Starting a process with a shell, possible injection detected.

Metadata

Metadata

Assignees

Labels

No labels
No labels

Type

No type
No fields configured for issues without a type.

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions