Open Source AI Coding Agent Vulnerability in Anomaly Co's OpenCode
CVE-2026-22812

8.8HIGH

Key Information:

Vendor

Anomalyco

Status
Vendor
CVE Published:
12 January 2026

Badges

๐Ÿ”ฅ Trending now๐Ÿ“ˆ Trended๐Ÿ“ˆ Score: 1,640๐Ÿ‘พ Exploit Exists๐ŸŸก Public PoC

What is CVE-2026-22812?

CVE-2026-22812 is a vulnerability identified within Anomaly Co's open-source AI coding agent, OpenCode, which is designed to assist developers in generating code snippets and automating coding tasks. Prior to version 1.0.216, users experienced a critical flaw where the software would inadvertently start an unauthenticated HTTP server. This server allows local processes or websitesโ€”via permissive Cross-Origin Resource Sharing (CORS)โ€”to execute arbitrary shell commands with the user's privileges. Such a vulnerability presents significant risks, as it can lead to unauthorized command execution and complete system compromise, ultimately jeopardizing the integrity and security of affected systems.

Potential impact of CVE-2026-22812

  1. Unauthorized Command Execution: Attackers can leverage this vulnerability to execute arbitrary commands on a system, allowing them to manipulate files, deploy malware, or maintain persistent access.

  2. Data Breaches: The ability to run unauthorized commands can lead to unauthorized access to sensitive data stored on affected systems, thereby resulting in significant data breaches that could impact privacy and compliance obligations.

  3. System Compromise: The flaw may enable threat actors to take full control over the affected systems, creating opportunities for further exploits, data manipulation, or the introduction of ransomware into the organizational infrastructure, risking extensive downtime and financial losses.

Affected Version(s)

opencode < 1.0.216

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • ๐Ÿ“ˆ

    Vulnerability started trending

  • ๐ŸŸก

    Public PoC available

  • ๐Ÿ‘พ

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

.