CVE-2026-22208 PUBLISHED

OpenS100 Portrayal Engine Unrestricted Lua Standard Library Access

Assigner: VulnCheck
Reserved: 06.01.2026 Published: 17.02.2026 Updated: 17.02.2026

OpenS100 (the reference implementation S-100 viewer) prior to commit 753cf29 contain a remote code execution vulnerability via an unrestricted Lua interpreter. The Portrayal Engine initializes Lua using luaL_openlibs() without sandboxing or capability restrictions, exposing standard libraries such as 'os' and 'io' to untrusted portrayal catalogues. An attacker can provide a malicious S-100 portrayal catalogue containing Lua scripts that execute arbitrary commands with the privileges of the OpenS100 process when a user imports the catalogue and loads a chart.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
CVSS Score: 9.4

Product Status

Vendor OpenS100 Project
Product OpenS100
Versions Default: unaffected
  • affected from 0 to commit 753cf29 (excl.)

Credits

  • Hoyeon Cho, National Korea Maritime and Ocean University finder

References

Problem Types

  • CWE-749 Exposed Dangerous Method or Function CWE
  • CWE-829 Inclusion of Functionality from Untrusted Control Sphere CWE