๐Ÿ” CVE Alert

CVE-2026-6987

HIGH 7.3

PicoClaw Web Launcher Management Plane restart command injection

CVSS Score
7.3
EPSS Score
0.0%
EPSS Percentile
0th

A vulnerability was detected in PicoClaw up to 0.2.4. Impacted is an unknown function of the file /api/gateway/restart of the component Web Launcher Management Plane. Performing a manipulation results in command injection. It is possible to initiate the attack remotely. The project was informed of the problem early through an issue report but has not responded yet.

CWE CWE-77 CWE-74
Vendor n/a
Product picoclaw
Published Apr 25, 2026
Stay Ahead of the Next One

Get instant alerts for n/a picoclaw

Be the first to know when new high vulnerabilities affecting n/a picoclaw are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

n/a / PicoClaw
0.2.0 0.2.1 0.2.2 0.2.3 0.2.4

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
vuldb.com: https://vuldb.com/vuln/359530 vuldb.com: https://vuldb.com/vuln/359530/cti vuldb.com: https://vuldb.com/submit/796336 github.com: https://github.com/sipeed/picoclaw/issues/2307

Credits

๐Ÿ” AiSec (VulDB User) VulDB CNA Team