{"api_version":"1","generated_at":"2026-04-23T02:37:06+00:00","cve":"CVE-2021-41116","urls":{"html":"https://cve.report/CVE-2021-41116","api":"https://cve.report/api/cve/CVE-2021-41116.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2021-41116","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2021-41116"},"summary":{"title":"CVE-2021-41116","description":"Composer is an open source dependency manager for the PHP language. In affected versions windows users running Composer to install untrusted dependencies are subject to command injection and should upgrade their composer version. Other OSs and WSL are not affected. The issue has been resolved in composer versions 1.10.23 and 2.1.9. There are no workarounds for this issue.","state":"PUBLIC","assigner":"security-advisories@github.com","published_at":"2021-10-05 18:15:00","updated_at":"2023-10-25 18:16:00"},"problem_types":["CWE-77"],"metrics":[],"references":[{"url":"https://www.sonarsource.com/blog/securing-developer-tools-package-managers/","name":"https://www.sonarsource.com/blog/securing-developer-tools-package-managers/","refsource":"MISC","tags":[],"title":"Securing Developer Tools: Package Managers | Sonar","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/composer/composer/commit/ca5e2f8d505fd3bfac6f7c85b82f2740becbc0aa","name":"https://github.com/composer/composer/commit/ca5e2f8d505fd3bfac6f7c85b82f2740becbc0aa","refsource":"MISC","tags":[],"title":"Fix escaping issues on Windows which could lead to command injection,… · composer/composer@ca5e2f8 · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.tenable.com/security/tns-2022-09","name":"https://www.tenable.com/security/tns-2022-09","refsource":"CONFIRM","tags":[],"title":"[R1] Tenable.sc 5.21.0 Fixes Multiple Third-Party Vulnerabilities - Security Advisory | Tenable®","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/composer/composer/security/advisories/GHSA-frqg-7g38-6gcf","name":"https://github.com/composer/composer/security/advisories/GHSA-frqg-7g38-6gcf","refsource":"CONFIRM","tags":[],"title":"Improper escaping of command arguments on Windows leading to command injection · Advisory · composer/composer · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2021-41116","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-41116","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2021","cve_id":"41116","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"getcomposer","cpe5":"composer","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"41116","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"tenable","cpe5":"tenable.sc","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2021-41116","qid":"501826","title":"Alpine Linux Security Update for composer"},{"cve":"CVE-2021-41116","qid":"504628","title":"Alpine Linux Security Update for composer"}]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2021-41116","ASSIGNER":"security-advisories@github.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"Composer is an open source dependency manager for the PHP language. In affected versions windows users running Composer to install untrusted dependencies are subject to command injection and should upgrade their composer version. Other OSs and WSL are not affected. The issue has been resolved in composer versions 1.10.23 and 2.1.9. There are no workarounds for this issue."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')","cweId":"CWE-77"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"composer","product":{"product_data":[{"product_name":"composer","version":{"version_data":[{"version_affected":"=","version_value":"< 1.10.23"},{"version_affected":"=","version_value":">= 2.0, < 2.1.9"}]}}]}}]}},"references":{"reference_data":[{"url":"https://github.com/composer/composer/security/advisories/GHSA-frqg-7g38-6gcf","refsource":"MISC","name":"https://github.com/composer/composer/security/advisories/GHSA-frqg-7g38-6gcf"},{"url":"https://github.com/composer/composer/commit/ca5e2f8d505fd3bfac6f7c85b82f2740becbc0aa","refsource":"MISC","name":"https://github.com/composer/composer/commit/ca5e2f8d505fd3bfac6f7c85b82f2740becbc0aa"},{"url":"https://www.sonarsource.com/blog/securing-developer-tools-package-managers/","refsource":"MISC","name":"https://www.sonarsource.com/blog/securing-developer-tools-package-managers/"}]},"source":{"advisory":"GHSA-frqg-7g38-6gcf","discovery":"UNKNOWN"},"impact":{"cvss":[{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":8.2,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"LOW","privilegesRequired":"NONE","scope":"CHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N","version":"3.1"}]}},"nvd":{"publishedDate":"2021-10-05 18:15:00","lastModifiedDate":"2023-10-25 18:16:00","problem_types":["CWE-77"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL"},"exploitabilityScore":3.9,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL","baseScore":7.5},"severity":"HIGH","exploitabilityScore":10,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:getcomposer:composer:*:*:*:*:*:*:*:*","versionEndExcluding":"1.10.23","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:getcomposer:composer:*:*:*:*:*:*:*:*","versionStartIncluding":"2.0.0","versionEndExcluding":"2.1.9","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:tenable:tenable.sc:*:*:*:*:*:*:*:*","versionEndExcluding":"5.21.0","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2021","CveId":"41116","Ordinal":"217058","Title":"CVE-2021-41116","CVE":"CVE-2021-41116","Year":"2021"},"notes":[{"CveYear":"2021","CveId":"41116","Ordinal":"1","NoteData":"Composer is an open source dependency manager for the PHP language. In affected versions windows users running Composer to install untrusted dependencies are subject to command injection and should upgrade their composer version. Other OSs and WSL are not affected. The issue has been resolved in composer versions 1.10.23 and 2.1.9. There are no workarounds for this issue.","Type":"Description","Title":null},{"CveYear":"2021","CveId":"41116","Ordinal":"2","NoteData":"2021-10-05","Type":"Other","Title":"Published"},{"CveYear":"2021","CveId":"41116","Ordinal":"3","NoteData":"2021-10-05","Type":"Other","Title":"Modified"}]}}}