Home

Description

OpenShell before 2026.3.28 contains an arbitrary code execution vulnerability in mirror mode that converts untrusted sandbox files into workspace hooks. Attackers with mirror mode access can execute arbitrary code on the host during gateway startup by exploiting enabled workspace hooks.

PUBLISHED Reserved 2026-04-20 | Published 2026-04-23 | Updated 2026-04-24 | Assigner VulnCheck




MEDIUM: 5.4CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

HIGH: 7.3CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H

Problem types

CWE-829: Inclusion of Functionality from Untrusted Control Sphere

Product status

Default status
unaffected

Any version before 2026.3.28
affected

2026.3.28 (semver)
unaffected

Credits

tdjackey reporter

References

github.com/...enclaw/security/advisories/GHSA-42mx-vp8m-j7qh (GitHub Security Advisory (GHSA-42mx-vp8m-j7qh)) vendor-advisory

github.com/...ommit/c02ee8a3a4cb390b23afdf21317aa8b2096854d1 (Patch Commit) patch

www.vulncheck.com/...via-mirror-mode-sandbox-file-conversion (VulnCheck Advisory: OpenShell < 2026.3.28 - Arbitrary Code Execution via Mirror Mode Sandbox File Conversion) third-party-advisory

cve.org (CVE-2026-41355)

nvd.nist.gov (CVE-2026-41355)

Download JSON