OpenShell EUVD-2026-25339

| CVE-2026-41355 MEDIUM
Inclusion of Functionality from Untrusted Control Sphere (CWE-829)
2026-04-23 VulnCheck GHSA-m563-373q-885c
5.4
CVSS 4.0
Share

CVSS VectorNVD

CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
P
Scope
X

Lifecycle Timeline

2
Severity Changed
Apr 23, 2026 - 22:28 NVD
HIGH MEDIUM
CVSS changed
Apr 23, 2026 - 22:28 NVD
7.3 (HIGH) 5.4 (MEDIUM)

DescriptionNVD

OpenShell before 2026.3.28 contains an arbitrary code execution vulnerability in mirror mode that converts untrusted sandbox files into workspace hooks. Attackers with mirror mode access can execute arbitrary code on the host during gateway startup by exploiting enabled workspace hooks.

Analysis

OpenShell before 2026.3.28 contains an arbitrary code execution vulnerability in mirror mode that converts untrusted sandbox files into workspace hooks. Attackers with mirror mode access can execute arbitrary code on the host during gateway startup by exploiting enabled workspace hooks.

Sign in for full analysis, threat intelligence, and remediation guidance.

Share

EUVD-2026-25339 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy