{"id":"CVE-2026-35533","summary":"mise has a local settings bypass config trust checks","details":"mise manages dev tools like node, python, cmake, and terraform. From 2026.2.18 through 2026.4.5, mise loads trust-control settings from a local project .mise.toml before the trust check runs. An attacker who can place a malicious .mise.toml in a repository can make that same file appear trusted and then reach dangerous directives such as [env] _.source, templates, hooks, or tasks.","aliases":["GHSA-436v-8fw5-4mj8"],"modified":"2026-04-09T03:48:07.738929Z","published":"2026-04-07T21:01:16.670Z","database_specific":{"cna_assigner":"GitHub_M","cwe_ids":["CWE-284"],"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/35xxx/CVE-2026-35533.json"},"references":[{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/35xxx/CVE-2026-35533.json"},{"type":"ADVISORY","url":"https://github.com/jdx/mise/security/advisories/GHSA-436v-8fw5-4mj8"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-35533"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/jdx/mise","events":[{"introduced":"538febbd37101d89b3427e3b2a5ce6c06543f0bf"},{"last_affected":"09639ac906c9934a8502cca4bc7bd0d6ef27ca13"}],"database_specific":{"versions":[{"introduced":"2026.2.18"},{"last_affected":"2026.4.5"}]}}],"versions":["aqua-registry-v2026.2.14","aqua-registry-v2026.2.15","aqua-registry-v2026.2.16","aqua-registry-v2026.2.17","aqua-registry-v2026.2.18","aqua-registry-v2026.3.1","aqua-registry-v2026.3.10","aqua-registry-v2026.3.11","aqua-registry-v2026.3.2","aqua-registry-v2026.3.3","aqua-registry-v2026.3.4","aqua-registry-v2026.3.5","aqua-registry-v2026.3.6","aqua-registry-v2026.3.7","aqua-registry-v2026.3.8","aqua-registry-v2026.3.9","aqua-registry-v2026.4.1","aqua-registry-v2026.4.2","aqua-registry-v2026.4.3","aqua-registry-v2026.4.4","v2026.2.18","v2026.2.19","v2026.2.20","v2026.2.21","v2026.2.22","v2026.2.23","v2026.2.24","v2026.3.0","v2026.3.1","v2026.3.10","v2026.3.11","v2026.3.12","v2026.3.13","v2026.3.14","v2026.3.15","v2026.3.16","v2026.3.17","v2026.3.18","v2026.3.2","v2026.3.3","v2026.3.4","v2026.3.5","v2026.3.6","v2026.3.7","v2026.3.8","v2026.3.9","v2026.4.0","v2026.4.1","v2026.4.2","v2026.4.3","v2026.4.4","v2026.4.5","vfox-v2026.2.6","vfox-v2026.2.7","vfox-v2026.3.0","vfox-v2026.3.1","vfox-v2026.3.2","vfox-v2026.3.3","vfox-v2026.3.4","vfox-v2026.3.5","vfox-v2026.4.0","vfox-v2026.4.1"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-35533.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"}]}