CVE-2026-6987
Published: 25 April 2026
Description
A vulnerability was detected in PicoClaw up to 0.2.4. Impacted is an unknown function of the file /api/gateway/restart of the component Web Launcher Management Plane. Performing a manipulation results in command injection. It is possible to initiate the attack remotely.…
more
The project was informed of the problem early through an issue report but has not responded yet.
Mitigating Controls (NIST 800-53 r5)AI
SI-10 directly prevents command injection vulnerabilities like CVE-2026-6987 by requiring validation and neutralization of special elements in inputs to the /api/gateway/restart endpoint.
SI-2 mandates timely identification, reporting, and correction of flaws, addressing the unpatched command injection in PicoClaw up to 0.2.4.
SC-7 provides boundary protection via mechanisms like web application firewalls to block or detect remote command injection attempts on the unauthenticated network-accessible endpoint.
Security SummaryAI
CVE-2026-6987 is a command injection vulnerability in PicoClaw versions up to 0.2.4. The issue affects an unknown function in the /api/gateway/restart file within the Web Launcher Management Plane component. Classified under CWE-74 (Improper Neutralization of Special Elements) and CWE-77 (Command Injection), it carries a CVSS v3.1 base score of 7.3 (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L), indicating high severity due to its network accessibility and ease of exploitation.
Attackers can exploit this vulnerability remotely without authentication, privileges, or user interaction, requiring only low attack complexity. By manipulating the affected endpoint, they can inject arbitrary commands, achieving limited impacts on confidentiality (C:L), integrity (I:L), and availability (A:L), such as unauthorized command execution on the host system.
Advisories note that the PicoClaw project was informed early through GitHub issue #2307 (https://github.com/sipeed/picoclaw/issues/2307) but has not responded. No patches or official mitigations are available. Further details appear in VulDB entries (https://vuldb.com/vuln/359530, https://vuldb.com/submit/796336, https://vuldb.com/vuln/359530/cti).
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability is a remote unauthenticated command injection in a public-facing web API endpoint, directly enabling T1190 (Exploit Public-Facing Application) for initial access and facilitating T1059.004 (Unix Shell) for arbitrary command execution on the host.