2026-05-12 19:6CVE-2026-44861hpe
PUBLISHED5.2

Authenticated Remote Code Execution via SQL Injection in AOS-8 and AOS-10 Operating Systems

SQL injection vulnerabilities exist in several underlying service components accessible through the AOS-8 and AOS-10 command-line interface and management protocol. An authenticated attacker with administrative privileges could exploit these vulnerabilities by injecting crafted input into parameters that are passed unsanitized to backend database queries. Successful exploitation could allow the attacker to execute arbitrary commands on the underlying operating system.

Affected products

Hewlett Packard Enterprise (HPE)

HPE Aruba Networking Wireless Operating System (AOS)

<= 8.13.1.1 - AFFECTED

<= 8.12.0.6 - AFFECTED

<= 8.10.0.21 - AFFECTED

<= 10.7.2.2 - AFFECTED

10.8.0.0 - AFFECTED

<= 10.4.1.10 - AFFECTED

References

GitHub Security Advisories

GHSA-8xm6-v26m-8mrc

SQL injection vulnerabilities exist in several underlying service components accessible through...

https://github.com/advisories/GHSA-8xm6-v26m-8mrc

SQL injection vulnerabilities exist in several underlying service components accessible through the AOS-8 and AOS-10 command-line interface and management protocol. An authenticated attacker with administrative privileges could exploit these vulnerabilities by injecting crafted input into parameters that are passed unsanitized to backend database queries. Successful exploitation could allow the attacker to execute arbitrary commands on the underlying operating system.

JSON source

https://cveawg.mitre.org/api/cve/CVE-2026-44861
Click to expand
{
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "cveMetadata": {
    "cveId": "CVE-2026-44861",
    "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
    "assignerShortName": "hpe",
    "dateUpdated": "2026-05-12T19:07:07.251Z",
    "dateReserved": "2026-05-07T21:29:07.696Z",
    "datePublished": "2026-05-12T19:06:35.878Z",
    "state": "PUBLISHED"
  },
  "containers": {
    "cna": {
      "providerMetadata": {
        "orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
        "shortName": "hpe",
        "dateUpdated": "2026-05-12T19:07:07.251Z"
      },
      "title": "Authenticated Remote Code Execution via SQL Injection in AOS-8 and AOS-10 Operating Systems",
      "descriptions": [
        {
          "lang": "en",
          "value": "SQL injection vulnerabilities exist in several underlying service components accessible through the AOS-8 and AOS-10 command-line interface and management protocol. An authenticated attacker with administrative privileges could exploit these vulnerabilities by injecting crafted input into parameters that are passed unsanitized to backend database queries. Successful exploitation could allow the attacker to execute arbitrary commands on the underlying operating system.",
          "supportingMedia": [
            {
              "type": "text/html",
              "base64": false,
              "value": "<p>SQL injection vulnerabilities exist in several underlying service components accessible through the AOS-8 and AOS-10 command-line interface and management protocol. An authenticated attacker with administrative privileges could exploit these vulnerabilities by injecting crafted input into parameters that are passed unsanitized to backend database queries. Successful exploitation could allow the attacker to execute arbitrary commands on the underlying operating system.</p>"
            }
          ]
        }
      ],
      "affected": [
        {
          "vendor": "Hewlett Packard Enterprise (HPE)",
          "product": "HPE Aruba Networking Wireless Operating System (AOS)",
          "defaultStatus": "affected",
          "versions": [
            {
              "version": "8.13.0.0",
              "status": "affected",
              "versionType": "semver",
              "lessThanOrEqual": "8.13.1.1"
            },
            {
              "version": "8.12.0.0",
              "status": "affected",
              "versionType": "semver",
              "lessThanOrEqual": "8.12.0.6"
            },
            {
              "version": "8.10.0.0",
              "status": "affected",
              "versionType": "semver",
              "lessThanOrEqual": "8.10.0.21"
            },
            {
              "version": "10.7.0.0",
              "status": "affected",
              "versionType": "semver",
              "lessThanOrEqual": "10.7.2.2"
            },
            {
              "version": "10.8.0.0",
              "status": "affected",
              "versionType": "semver"
            },
            {
              "version": "10.4.0.0",
              "status": "affected",
              "versionType": "semver",
              "lessThanOrEqual": "10.4.1.10"
            }
          ]
        }
      ],
      "references": [
        {
          "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw05048en_us&docLocale=en_US"
        }
      ],
      "metrics": [
        {
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ],
          "cvssV3_1": {
            "version": "3.1",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "attackVector": "NETWORK",
            "attackComplexity": "LOW",
            "privilegesRequired": "HIGH",
            "userInteraction": "NONE",
            "scope": "UNCHANGED",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "availabilityImpact": "HIGH",
            "baseScore": 7.2,
            "baseSeverity": "HIGH"
          }
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "zzcentury",
          "type": "reporter"
        }
      ]
    }
  }
}