CVE-2026-6987
Published: 25 April 2026
Summary
CVE-2026-6987 is a high-severity Injection (CWE-74) vulnerability in Sipeed Picoclaw. Its CVSS base score is 7.3 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 41.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
SI-10 directly prevents command injection vulnerabilities like CVE-2026-6987 by requiring validation and neutralization of special elements in inputs to the /api/gateway/restart endpoint.
SI-2 mandates timely identification, reporting, and correction of flaws, addressing the unpatched command injection in PicoClaw up to 0.2.4.
SC-7 provides boundary protection via mechanisms like web application firewalls to block or detect remote command injection attempts on the unauthenticated network-accessible endpoint.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability is a remote unauthenticated command injection in a public-facing web API endpoint, directly enabling T1190 (Exploit Public-Facing Application) for initial access and facilitating T1059.004 (Unix Shell) for arbitrary command execution on the host.
NVD Description
A vulnerability was detected in PicoClaw up to 0.2.4. Impacted is an unknown function of the file /api/gateway/restart of the component Web Launcher Management Plane. Performing a manipulation results in command injection. It is possible to initiate the attack remotely.…
more
The project was informed of the problem early through an issue report but has not responded yet.
Deeper analysisAI
CVE-2026-6987 is a command injection vulnerability in PicoClaw versions up to 0.2.4. The issue affects an unknown function in the /api/gateway/restart file within the Web Launcher Management Plane component. Classified under CWE-74 (Improper Neutralization of Special Elements) and CWE-77 (Command Injection), it carries a CVSS v3.1 base score of 7.3 (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L), indicating high severity due to its network accessibility and ease of exploitation.
Attackers can exploit this vulnerability remotely without authentication, privileges, or user interaction, requiring only low attack complexity. By manipulating the affected endpoint, they can inject arbitrary commands, achieving limited impacts on confidentiality (C:L), integrity (I:L), and availability (A:L), such as unauthorized command execution on the host system.
Advisories note that the PicoClaw project was informed early through GitHub issue #2307 (https://github.com/sipeed/picoclaw/issues/2307) but has not responded. No patches or official mitigations are available. Further details appear in VulDB entries (https://vuldb.com/vuln/359530, https://vuldb.com/submit/796336, https://vuldb.com/vuln/359530/cti).
Details
- CWE(s)