CVE-2023-28627
Homebrew vulnerability analysis and mitigation

Overview

pymedusa is an automatic video library manager for TV Shows. In versions prior to 1.0.12, a critical vulnerability (CVE-2023-28627) was discovered that allows attackers with access to the web interface to execute arbitrary OS commands by manipulating the git executable path in /config/general/ > advanced settings. The vulnerability was discovered and reported by pizza-power and disclosed on March 25, 2023 (GitHub Advisory).

Technical details

The vulnerability is classified as an OS Command Injection (CWE-78) with a CVSS v3.1 base score of 8.8 HIGH (NIST) and 8.3 HIGH (GitHub). The attack vector is network-based (AV:N) with low attack complexity (AC:L), requiring low privileges (PR:L) and no user interaction (UI:N). The vulnerability exists in the github_updater.py package, where insufficient validation of the GIT_PATH parameter allows injection of arbitrary OS commands (GitHub Advisory).

Impact

An attacker who successfully exploits this vulnerability can execute arbitrary commands on the system with the privileges of the user running the pymedusa program. While exposure to the internet is limited, compromised systems could allow attackers to take complete control of the affected system (GitHub Advisory).

Mitigation and workarounds

Users are advised to upgrade to version 1.0.12 or later, which contains a patch for this vulnerability. The fix includes validation of the GIT_PATH parameter in config.py to disallow special characters except for directory separators and ensures that the entry contains the string 'git'. Additionally, implementing mandatory username/password authentication during installation is recommended to reduce the number of exposed instances (GitHub Advisory, GitHub Commit).

Additional resources


SourceThis report was generated using AI

Related Homebrew vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-21428HIGH7.7
  • HomebrewHomebrew
  • cpp-httplib
NoYesJan 01, 2026
CVE-2025-68120MEDIUM5.4
  • NixOSNixOS
  • go
NoYesDec 30, 2025
CVE-2025-69413MEDIUM5.3
  • NixOSNixOS
  • code.gitea.io/gitea
NoYesJan 01, 2026
CVE-2025-15412MEDIUM4.8
  • NixOSNixOS
  • wabt
NoNoJan 01, 2026
CVE-2025-15411MEDIUM4.8
  • NixOSNixOS
  • wabt
NoNoJan 01, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management