Command Injection Vulnerability in VMware Aria Operations
CVE-2026-22719

8.1HIGH

Key Information:

Vendor

Vmware

Vendor
CVE Published:
25 February 2026

Badges

๐Ÿ“ˆ Trended๐Ÿ“ˆ Score: 1,370๐Ÿ‘พ Exploit Exists๐Ÿฆ… CISA Reported

What is CVE-2026-22719?

CVE-2026-22719 is a serious command injection vulnerability discovered in VMware Aria Operations. This software is designed to provide operational insights and analytics for various VMware environments, facilitating efficient management of resources in cloud settings. The vulnerability allows a malicious actor, who does not need to be authenticated, to execute arbitrary commands on systems running VMware Aria Operations. Such exploitation can occur particularly during support-assisted product migration, which poses a significant risk to an organizationโ€™s infrastructure and operational integrity. If exploited, this vulnerability could lead to unauthorized remote code execution, enabling attackers to gain control over affected systems and potentially disrupting services or compromising sensitive data.

Potential impact of CVE-2026-22719

  1. Remote Code Execution: Exploitation of this vulnerability can lead to remote code execution, allowing attackers to run arbitrary commands on the affected servers, which could lead to further systemic exploitation.

  2. Compromise of Sensitive Data: With remote code execution capabilities, attackers could potentially access, modify, or exfiltrate sensitive operational data, thus jeopardizing data confidentiality and integrity.

  3. Service Disruption: As VMware Aria Operations is integral to the management of cloud environments, successful exploitation could lead to service outages, affecting business continuity and causing financial and reputational damage to the organization.

CISA has reported CVE-2026-22719

CISA provides regional cyber and physical services to support security and resilience across the United States. CISA monitor the most dangerious vulnerabilities and have identifed CVE-2026-22719 as being exploited but is not known by the CISA to be used in ransomware campaigns. This is subject to change at pace

The CISA's recommendation is: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

Aria Operations 8.18.0

Aria Operations 8.18.0 < 8.18.6

Cloud Foundationcust 9.0

References

CVSS V3.1

Score:
8.1
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • ๐Ÿ“ˆ

    Vulnerability started trending

  • ๐Ÿ‘พ

    Exploit known to exist

  • ๐Ÿฆ…

    CISA Reported

  • Vulnerability published

  • Vulnerability Reserved

.