Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
8.9

RustSec Advisory: Elevated Privileges via Malicious Code Execution

GHSA-9c4h-pwmf-m6fj CVE-2026-30960 GHSA-9c4h-pwmf-m6fj RUSTSEC-2026-0038
Summary

The JIT compilation engine in this library allows an attacker to inject malicious code, potentially executing it with the same privileges as the host process. This affects developers using the library in multi-language environments, cloud providers, and users processing untrusted datasets. To fix, update to version 0.2.9 or use a restricted sandbox to run the library.

What to do
  • Update rssn to version 0.2.9.
Affected software
VendorProductAffected versionsFix available
rssn <= 0.2.9 0.2.9
rssn > 0.1.20 , <= 0.2.9 0.2.9
Original title
RustSec Advisory
Original description
## Impact

**Vulnerability Type**:
Improper Control of Generation of Code ('Code Injection') (CWE-94) / Improper Check for Unusual or Exceptional Conditions (CWE-754) / Improper Input Validation (CWE-20) / Use of Low-Level Functionality (CWE-695) / Improper Privilege Management (CWE-269) / External Control of System or Configuration Setting (CWE-15).

**Technical Details**:
The vulnerability exists in the JIT (Just-In-Time) compilation engine, which is fully exposed via the CFFI (Foreign Function Interface). Due to Improper Input Validation and External Control of Code Generation, an attacker can supply malicious parameters or instruction sequences through the CFFI layer. Since the library often operates with elevated privileges or within high-performance computing contexts, this allows for Arbitrary Code Execution (ACE) at the privilege level of the host process.

## Who is Impacted?

* Developers using the library as a dynamic linked library (.so, .dll, .dylib) in multi-language environments (e.g., Python, Node.js, C++).
* Cloud Service Providers running the library in multi-tenant environments or automated model-training pipelines.
* Users processing untrusted or third-party datasets/models that may trigger malicious JIT instruction generation.
Patches
* Affected versions: < 0.2.8
* Patched version: 0.2.9

## Workarounds

If you cannot upgrade immediately, please consider the following mitigations:
* Strict Sandboxing: Run the library within a restricted sandbox (e.g., WebAssembly, Docker with non-root user, or seccomp profiles) to limit system call access.
* Principle of Least Privilege: Ensure the process calling the library does not have administrative or root privileges.
* Input Filtering: If possible, implement an application-level validation layer to sanitize any data passed to the CFFI interfaces.
* Disable JIT (if applicable): If your workload allows, use the interpreter-only mode (if provided by the library) to bypass the JIT engine entirely.

## References

[Apich Organization Security Team Homepage](https://security.apich.org/)
ghsa CVSS4.0 9.4
Vulnerability type
CWE-15
CWE-20 Improper Input Validation
CWE-94 Code Injection
CWE-269 Improper Privilege Management
CWE-695
CWE-754
Published: 8 Mar 2026 · Updated: 13 Mar 2026 · First seen: 10 Mar 2026