Cyber Posture

CVE-2026-43991

High

Published: 12 May 2026

Published
12 May 2026
Modified
12 May 2026
KEV Added
Patch
CVSS Score 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score N/A
Risk Priority 17 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-43991 is a high-severity OS Command Injection (CWE-78) vulnerability. Its CVSS base score is 8.4 (High).

Operationally, it is not currently listed in the CISA KEV catalog.

This vulnerability is AI-related — categorised as Other AI Platforms; in the Adversarial Attacks risk domain.

Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-78

Platform-independent apps typically execute inside a managed runtime or sandbox that restricts direct OS command execution, reducing the ability to exploit OS command injection.

addresses: CWE-78

Validates inputs to block special elements that would alter OS command execution.

addresses: CWE-184

Spam filters rely on evolving blacklists, signatures, and heuristics of disallowed message patterns; keeping them updated per the control directly mitigates incomplete disallowed-input lists.

NVD Description

JunoClaw is an agentic AI platform built on Juno Network. Prior to 0.x.y-security-1, substring-based blocklist in plugin-shell's command-safety check could be bypassed by adversarial argument constructions, allowing unauthorized command execution on the host when combined with the companion advisory. Pre-patch,…

more

the check was applied to the raw command string rather than the parsed first token. This vulnerability is fixed in 0.x.y-security-1.

Deeper analysisAI

Automated synthesis unavailable for this CVE.

Details

CWE(s)

AI Security AnalysisAI

AI Category
Other AI Platforms
Risk Domain
Adversarial Attacks
OWASP Top 10 for LLMs 2025
None mapped
Classification Reason
Matched keywords: ai

References