Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-6r3x-h84w-fhxx | PicoClaw has an Injection issue in its Web Launcher Management Plane component |
Fri, 01 May 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:sipeed:picoclaw:*:*:*:*:*:go:*:* |
Mon, 27 Apr 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sipeed
Sipeed picoclaw |
|
| Vendors & Products |
Sipeed
Sipeed picoclaw |
Mon, 27 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sat, 25 Apr 2026 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was detected in PicoClaw up to 0.2.4. Impacted is an unknown function of the file /api/gateway/restart of the component Web Launcher Management Plane. Performing a manipulation results in command injection. It is possible to initiate the attack remotely. The project was informed of the problem early through an issue report but has not responded yet. | |
| Title | PicoClaw Web Launcher Management Plane restart command injection | |
| Weaknesses | CWE-74 CWE-77 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-04-27T13:34:16.415Z
Reserved: 2026-04-24T19:16:31.247Z
Link: CVE-2026-6987
Updated: 2026-04-27T13:20:24.583Z
Status : Analyzed
Published: 2026-04-25T17:16:33.870
Modified: 2026-05-01T20:24:30.653
Link: CVE-2026-6987
No data.
OpenCVE Enrichment
Updated: 2026-05-02T14:45:44Z
Github GHSA