Cyber Posture

CVE-2026-26093

CriticalRCE

Published: 20 February 2026

Published
20 February 2026
Modified
27 February 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0039 60.1th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-26093 is a critical-severity Command Injection (CWE-77) vulnerability in Owlcyberdefense Opds-Talon. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 39.9% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates command injection by requiring validation and sanitization of untrusted network inputs used in commands.

prevent

Addresses the specific flaw in Owl OPDS 2.2.0.4 by requiring timely remediation such as patching to eliminate the vulnerability.

preventdetect

Enforces boundary protections like web application firewalls to block or detect crafted network requests attempting command injection.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

CVE-2026-26093 is a command injection vulnerability in a network-facing application (Owl OPDS), enabling unauthenticated remote code execution, directly mapping to T1190: Exploit Public-Facing Application.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

Improper Neutralization of Special Elements used in a Command ('Command Injection') in Owl opds 2.2.0.4 allows Command Injection via a crafted network request.

Deeper analysisAI

CVE-2026-26093 is a command injection vulnerability (CWE-77) affecting Owl OPDS version 2.2.0.4, caused by improper neutralization of special elements used in a command. Published on 2026-02-20, the flaw enables command injection through a crafted network request.

The vulnerability carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating it is exploitable remotely over the network with low attack complexity, no privileges, authentication, or user interaction required, and unchanged impact scope. Any unauthenticated attacker can send a malicious request to inject and execute arbitrary commands, resulting in high confidentiality, integrity, and availability impacts, such as full system compromise.

Mitigation details are available in the Nozomi Networks vulnerability advisory at https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2026-26093.

Details

CWE(s)

Affected Products

owlcyberdefense
opds-talon
2.2.0.4

CVEs Like This One

CVE-2026-2333Same product: Owlcyberdefense Opds-100
CVE-2026-26102Same product: Owlcyberdefense Opds-100
CVE-2026-26101Same product: Owlcyberdefense Opds-100
CVE-2026-30461Shared CWE-77
CVE-2025-24285Shared CWE-77
CVE-2025-56425Shared CWE-77
CVE-2025-55637Shared CWE-77
CVE-2024-39759Shared CWE-77
CVE-2026-22719Shared CWE-77
CVE-2024-39360Shared CWE-77

References