CVE-2026-6987 PUBLISHED

PicoClaw Web Launcher Management Plane restart command injection

Assigner: VulDB
Reserved: 24.04.2026 Published: 25.04.2026 Updated: 25.04.2026

A vulnerability was detected in PicoClaw up to 0.2.4. Impacted is an unknown function of the file /api/gateway/restart of the component Web Launcher Management Plane. Performing a manipulation results in command injection. It is possible to initiate the attack remotely. The project was informed of the problem early through an issue report but has not responded yet.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
CVSS Score: 6.9

Product Status

Vendor n/a
Product PicoClaw
Versions
  • Version 0.2.0 is affected
  • Version 0.2.1 is affected
  • Version 0.2.2 is affected
  • Version 0.2.3 is affected
  • Version 0.2.4 is affected

Credits

  • AiSec (VulDB User) reporter
  • VulDB CNA Team coordinator

References

Problem Types

  • Command Injection CWE
  • Injection CWE