Generated remediation guidance and an executive summary. No account required.
systeminformation is an open source system and OS information library for node.js. A command injection vulnerability has been discovered in versions of systeminformation prior to 5.6.4. The issue has been fixed with a parameter check on user input. Please upgrade to version >= 5.6.4. If you cannot upgrade, be sure to check or sanitize service parameters that are passed to si.inetLatency(), si.inetChecksite(), si.services(), si.processLoad() and other commands. Only allow strings, reject any arrays. String sanitation works as expected.
Use CWE-20, Systeminformation vendor hub and Systeminformation product page to widen CVE-2021-21388 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2021-21315, CVE-2023-42810 and CVE-2026-26318 for nearby disclosures in the same product family.