CVE-2026-22208
OpenS100 · OpenS100 (S-100 Viewer)
OpenS100 is vulnerable to remote code execution via an unsandboxed Lua interpreter. Attackers can execute arbitrary commands by tricking a user into importing a malicious S-100 portrayal catalogue.
Executive summary
A critical remote code execution vulnerability in OpenS100 allows unauthenticated attackers to gain full control over the host process by providing a malicious portrayal catalogue.
Vulnerability
This vulnerability stems from an unrestricted Lua interpreter within the Portrayal Engine that lacks sandboxing. An unauthenticated attacker can leverage standard libraries like 'os' and 'io' via a crafted S-100 catalogue to execute arbitrary system commands when the catalogue is imported.
Business impact
A successful exploit results in a total compromise of the OpenS100 process, allowing for unauthorized data access, lateral movement within the network, and persistent system control. The CVSS score of 9.6 reflects the critical nature of this flaw, as it permits remote code execution with minimal user interaction beyond importing a file.
Remediation
Immediate Action: Update OpenS100 to a version containing commit 753cf29 or later to ensure the Lua interpreter is properly sandboxed.
Proactive Monitoring: Monitor system logs for unusual process spawning from the OpenS100 application and review all imported S-100 catalogues for suspicious Lua scripts.
Compensating Controls: Implement strict file-integrity monitoring and restrict the application's ability to execute shell commands using OS-level security policies or containers.
Exploitation status
Public Exploit Available: false
Analyst recommendation
The severity of this vulnerability cannot be overstated, as it allows for complete system takeover via a common user workflow. Organizations utilizing OpenS100 must prioritize updating to the latest patched version immediately to mitigate the risk of remote code execution.