Cyber Posture

CVE-2026-6987

HighPublic PoC

Published: 25 April 2026

Published
25 April 2026
Modified
01 May 2026
KEV Added
Patch
CVSS Score 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
EPSS Score 0.0020 41.6th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-6987 is a high-severity Injection (CWE-74) vulnerability in Sipeed Picoclaw. Its CVSS base score is 7.3 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 41.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

SI-10 directly prevents command injection vulnerabilities like CVE-2026-6987 by requiring validation and neutralization of special elements in inputs to the /api/gateway/restart endpoint.

prevent

SI-2 mandates timely identification, reporting, and correction of flaws, addressing the unpatched command injection in PicoClaw up to 0.2.4.

preventdetect

SC-7 provides boundary protection via mechanisms like web application firewalls to block or detect remote command injection attempts on the unauthenticated network-accessible endpoint.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.004 Unix Shell Execution
Adversaries may abuse Unix shell commands and scripts for execution.
Why these techniques?

The vulnerability is a remote unauthenticated command injection in a public-facing web API endpoint, directly enabling T1190 (Exploit Public-Facing Application) for initial access and facilitating T1059.004 (Unix Shell) for arbitrary command execution on the host.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

A vulnerability was detected in PicoClaw up to 0.2.4. Impacted is an unknown function of the file /api/gateway/restart of the component Web Launcher Management Plane. Performing a manipulation results in command injection. It is possible to initiate the attack remotely.…

more

The project was informed of the problem early through an issue report but has not responded yet.

Deeper analysisAI

CVE-2026-6987 is a command injection vulnerability in PicoClaw versions up to 0.2.4. The issue affects an unknown function in the /api/gateway/restart file within the Web Launcher Management Plane component. Classified under CWE-74 (Improper Neutralization of Special Elements) and CWE-77 (Command Injection), it carries a CVSS v3.1 base score of 7.3 (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L), indicating high severity due to its network accessibility and ease of exploitation.

Attackers can exploit this vulnerability remotely without authentication, privileges, or user interaction, requiring only low attack complexity. By manipulating the affected endpoint, they can inject arbitrary commands, achieving limited impacts on confidentiality (C:L), integrity (I:L), and availability (A:L), such as unauthorized command execution on the host system.

Advisories note that the PicoClaw project was informed early through GitHub issue #2307 (https://github.com/sipeed/picoclaw/issues/2307) but has not responded. No patches or official mitigations are available. Further details appear in VulDB entries (https://vuldb.com/vuln/359530, https://vuldb.com/submit/796336, https://vuldb.com/vuln/359530/cti).

Details

CWE(s)

Affected Products

sipeed
picoclaw
≤ 0.2.4

CVEs Like This One

CVE-2026-4203Shared CWE-74, CWE-77
CVE-2026-1419Shared CWE-74, CWE-77
CVE-2026-1327Shared CWE-74, CWE-77
CVE-2026-1802Shared CWE-74, CWE-77
CVE-2025-10629Shared CWE-74, CWE-77
CVE-2026-4207Shared CWE-74, CWE-77
CVE-2026-4195Shared CWE-74, CWE-77
CVE-2026-5104Shared CWE-74, CWE-77
CVE-2026-4209Shared CWE-74, CWE-77
CVE-2026-2118Shared CWE-74, CWE-77

References