SQL injection vulnerabilities exist in several underlying service components accessible through the AOS-8 and AOS-10 command-line interface and management protocol. An authenticated attacker with administrative privileges could exploit these vulnerabilities by injecting crafted input into parameters that are passed unsanitized to backend database queries. Successful exploitation could allow the attacker to execute arbitrary commands on the underlying operating system.
PUBLISHED5.2
Authenticated Remote Code Execution via SQL Injection in AOS-8 and AOS-10 Operating Systems
Affected products
Hewlett Packard Enterprise (HPE)
HPE Aruba Networking Wireless Operating System (AOS)
<= 8.13.1.1 - AFFECTED
<= 8.12.0.6 - AFFECTED
<= 8.10.0.21 - AFFECTED
<= 10.7.2.2 - AFFECTED
10.8.0.0 - AFFECTED
<= 10.4.1.10 - AFFECTED
References
GitHub Security Advisories
GHSA-3q8r-gjx2-h6v2
SQL injection vulnerabilities exist in several underlying service components accessible through...
https://github.com/advisories/GHSA-3q8r-gjx2-h6v2SQL injection vulnerabilities exist in several underlying service components accessible through the AOS-8 and AOS-10 command-line interface and management protocol. An authenticated attacker with administrative privileges could exploit these vulnerabilities by injecting crafted input into parameters that are passed unsanitized to backend database queries. Successful exploitation could allow the attacker to execute arbitrary commands on the underlying operating system.
JSON source
https://cveawg.mitre.org/api/cve/CVE-2026-44863Click to expand
{
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"cveMetadata": {
"cveId": "CVE-2026-44863",
"assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"assignerShortName": "hpe",
"dateUpdated": "2026-05-12T19:09:19.516Z",
"dateReserved": "2026-05-07T21:29:07.696Z",
"datePublished": "2026-05-12T19:09:19.516Z",
"state": "PUBLISHED"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"shortName": "hpe",
"dateUpdated": "2026-05-12T19:09:19.516Z"
},
"title": "Authenticated Remote Code Execution via SQL Injection in AOS-8 and AOS-10 Operating Systems",
"descriptions": [
{
"lang": "en",
"value": "SQL injection vulnerabilities exist in several underlying service components accessible through the AOS-8 and AOS-10 command-line interface and management protocol. An authenticated attacker with administrative privileges could exploit these vulnerabilities by injecting crafted input into parameters that are passed unsanitized to backend database queries. Successful exploitation could allow the attacker to execute arbitrary commands on the underlying operating system.",
"supportingMedia": [
{
"type": "text/html",
"base64": false,
"value": "<p>SQL injection vulnerabilities exist in several underlying service components accessible through the AOS-8 and AOS-10 command-line interface and management protocol. An authenticated attacker with administrative privileges could exploit these vulnerabilities by injecting crafted input into parameters that are passed unsanitized to backend database queries. Successful exploitation could allow the attacker to execute arbitrary commands on the underlying operating system.</p>"
}
]
}
],
"affected": [
{
"vendor": "Hewlett Packard Enterprise (HPE)",
"product": "HPE Aruba Networking Wireless Operating System (AOS)",
"defaultStatus": "affected",
"versions": [
{
"version": "8.13.0.0",
"status": "affected",
"versionType": "semver",
"lessThanOrEqual": "8.13.1.1"
},
{
"version": "8.12.0.0",
"status": "affected",
"versionType": "semver",
"lessThanOrEqual": "8.12.0.6"
},
{
"version": "8.10.0.0",
"status": "affected",
"versionType": "semver",
"lessThanOrEqual": "8.10.0.21"
},
{
"version": "10.7.0.0",
"status": "affected",
"versionType": "semver",
"lessThanOrEqual": "10.7.2.2"
},
{
"version": "10.8.0.0",
"status": "affected",
"versionType": "semver"
},
{
"version": "10.4.0.0",
"status": "affected",
"versionType": "semver",
"lessThanOrEqual": "10.4.1.10"
}
]
}
],
"references": [
{
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw05048en_us&docLocale=en_US"
}
],
"metrics": [
{
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
],
"cvssV3_1": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
}
}
],
"credits": [
{
"lang": "en",
"value": "zzcentury",
"type": "reporter"
}
]
}
}
}