mirror of
https://github.com/binwiederhier/ntfy.git
synced 2026-05-09 08:26:00 +02:00
[GH-ISSUE #1721] Windows client mode RCE vulnerability #1195
Labels
No labels
ai-generated
android-app
android-app
android-app
🪲 bug
build
build
dependencies
docs
enhancement
enhancement
🔥 HOT
in-progress 🏃
ios
prio:low
prio:low
pull-request
question
🔒 security
server
server
unified-push
web-app
website
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/ntfy#1195
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @KazuInu on GitHub (Apr 29, 2026).
Original GitHub issue: https://github.com/binwiederhier/ntfy/issues/1721
🐞 Describe the bug
The Windows client mode has a RCE vulnerability since the variable strings aren't escaped (nor sanitized) on command execution.
💻 Components impacted
ntfy Windows client. Haven't tested yet with the Linux version.
💡 Screenshots and/or logs
Example client config:
If the client receives a specific crafted message. You can execute arbitrary code on every client using the same channel.
Ex:
🔮 Additional context
This mostly applies to public instances of ntfy, since you are supposed to trust the users/bots on your private servers (at least in theory).
In the config above, I used notify-send just as a example, but the problem lies in how ntfy executes the command.
@KazuInu commented on GitHub (Apr 29, 2026):
To be honest... I really hope that this is just some bad config on my part, since I haven't found any reference about this in the documentation.