CVE-2026-34188
Published: 13 April 2026
Summary
CVE-2026-34188 is a high-severity OS Command Injection (CWE-78) vulnerability in Artica Pandora Fms. Its CVSS base score is 7.2 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Command and Scripting Interpreter (T1059); ranked at the 32.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly requires validation and neutralization of special elements in user inputs to Event Response execution, preventing OS command injection (CWE-78).
Ensures timely identification, reporting, and patching of the specific flaw in Pandora FMS versions 777-800 that enables OS command injection.
Enforces least privilege to restrict high-privilege (PR:H) access needed to exploit the command injection vulnerability via Event Response.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
OS command injection vulnerability in network-accessible Pandora FMS application directly enables arbitrary OS command execution via T1059: Command and Scripting Interpreter and facilitates exploitation of public-facing applications via T1190: Exploit Public-Facing Application.
NVD Description
Improper Neutralization of Special Elements used in an OS Command vulnerability allows OS Command Injection via Event Response execution. This issue affects Pandora FMS: from 777 through 800
Deeper analysisAI
CVE-2026-34188 is an improper neutralization of special elements used in an OS command vulnerability that enables OS command injection via Event Response execution. This flaw affects Pandora FMS versions from 777 through 800. It is classified under CWE-78 and carries a CVSS v3.1 base score of 7.2 (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to its potential for significant impact.
An attacker with high privileges (PR:H) can exploit this vulnerability over the network (AV:N) with low complexity (AC:L) and without requiring user interaction (UI:N). Successful exploitation allows arbitrary OS command injection, resulting in high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H), potentially enabling full system compromise on the affected Pandora FMS instance.
Pandora FMS has documented this vulnerability in its security advisories, available at https://pandorafms.com/en/security/common-vulnerabilities-and-exposures/. Security practitioners should consult this resource for details on patches and mitigation steps.
Details
- CWE(s)