Vulnerability Description
OpenS100 (the reference implementation S-100 viewer) prior to commit 753cf29 contain a remote code execution vulnerability via an unrestricted Lua interpreter. The Portrayal Engine initializes Lua using luaL_openlibs() without sandboxing or capability restrictions, exposing standard libraries such as 'os' and 'io' to untrusted portrayal catalogues. An attacker can provide a malicious S-100 portrayal catalogue containing Lua scripts that execute arbitrary commands with the privileges of the OpenS100 process when a user imports the catalogue and loads a chart.
CVSS Score
CRITICAL
Related Weaknesses (CWE)
References
- https://github.com/S-100ExpertTeam/OpenS100/commit/753cf294434e8d3961f20a567c4d9
- https://www.mdpi.com/1424-8220/26/4/1246
- https://www.vulncheck.com/advisories/opens100-portrayal-engine-unrestricted-lua-
FAQ
What is CVE-2026-22208?
CVE-2026-22208 is a vulnerability with a CVSS score of 9.6 (CRITICAL). OpenS100 (the reference implementation S-100 viewer) prior to commit 753cf29 contain a remote code execution vulnerability via an unrestricted Lua interpreter. The Portrayal Engine initializes Lua usi...
How severe is CVE-2026-22208?
CVE-2026-22208 has been rated CRITICAL with a CVSS base score of 9.6/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2026-22208?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.