2026-02-06 21:49CVE-2026-1731BT
PUBLISHED5.2CWE-78

Remote code execution vulnerability in BeyondTrust Remote Support (RS) and Privileged Remote Access (PRA)

BeyondTrust Remote Support (RS) and certain older versions of Privileged Remote Access (PRA) contain a critical pre-authentication remote code execution vulnerability. By sending specially crafted requests, an unauthenticated remote attacker may be able to execute operating system commands in the context of the site user.

Problem type

Affected products

BeyondTrust

Remote Support(RS) & Privileged Remote Access(PRA)

<= RS 25.3.1 - AFFECTED

<= PRA 24.3.4 - AFFECTED

References

GitHub Security Advisories

GHSA-p5wr-5p37-2wm6

BeyondTrust Remote Support (RS) and certain older versions of Privileged Remote Access (PRA)...

https://github.com/advisories/GHSA-p5wr-5p37-2wm6

BeyondTrust Remote Support (RS) and certain older versions of Privileged Remote Access (PRA) contain a critical pre-authentication remote code execution vulnerability. By sending specially crafted requests, an unauthenticated remote attacker may be able to execute operating system commands in the context of the site user.

JSON source

https://cveawg.mitre.org/api/cve/CVE-2026-1731
Click to expand
{
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "cveMetadata": {
    "cveId": "CVE-2026-1731",
    "assignerOrgId": "13061848-ea10-403d-bd75-c83a022c2891",
    "assignerShortName": "BT",
    "dateUpdated": "2026-02-06T21:49:20.844Z",
    "dateReserved": "2026-01-31T23:54:56.922Z",
    "datePublished": "2026-02-06T21:49:20.844Z",
    "state": "PUBLISHED"
  },
  "containers": {
    "cna": {
      "providerMetadata": {
        "orgId": "13061848-ea10-403d-bd75-c83a022c2891",
        "shortName": "BT",
        "dateUpdated": "2026-02-06T21:49:20.844Z"
      },
      "title": "Remote code execution vulnerability in BeyondTrust Remote Support (RS) and Privileged Remote Access (PRA)",
      "descriptions": [
        {
          "lang": "en",
          "value": "BeyondTrust Remote Support (RS) and certain older versions of Privileged Remote Access (PRA) contain a critical pre-authentication remote code execution vulnerability. By sending specially crafted requests, an unauthenticated remote attacker may be able to execute operating system commands in the context of the site user.",
          "supportingMedia": [
            {
              "type": "text/html",
              "base64": false,
              "value": "<span style=\"background-color: rgb(255, 255, 255);\">BeyondTrust Remote Support (RS) and certain older versions of Privileged Remote Access (PRA) contain a critical pre-authentication remote code execution vulnerability. By sending specially crafted requests, an unauthenticated remote attacker may be able to execute operating system commands in the context of the site user.</span><span style=\"background-color: rgb(255, 255, 255);\">&nbsp;</span><br>"
            }
          ]
        }
      ],
      "affected": [
        {
          "vendor": "BeyondTrust",
          "product": "Remote Support(RS) & Privileged Remote Access(PRA)",
          "defaultStatus": "unaffected",
          "versions": [
            {
              "version": "0",
              "status": "affected",
              "versionType": "custom",
              "lessThanOrEqual": "RS 25.3.1"
            },
            {
              "version": "0",
              "status": "affected",
              "versionType": "custom",
              "lessThanOrEqual": "PRA 24.3.4"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "lang": "en",
              "description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')",
              "cweId": "CWE-78",
              "type": "CWE"
            }
          ]
        }
      ],
      "references": [
        {
          "url": "https://beyondtrustcorp.service-now.com/csm?id=csm_kb_article&sysparm_article=KB0023293"
        },
        {
          "url": "https://www.beyondtrust.com/trust-center/security-advisories/bt26-02"
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-248",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-248 Command Injection"
            }
          ]
        }
      ],
      "metrics": [
        {
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ]
    }
  }
}