Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
9.4

OpenS100 S-100 Viewer Allows Untrusted Code to Run with Administrator Privileges

CVE-2026-22208
Summary

An attacker can embed malicious code in an S-100 file, which can then execute with administrator-level access when opened in OpenS100. This can lead to data theft, system compromise, or other malicious actions. Update OpenS100 to the latest version to fix this issue.

Original title
OpenS100 (the reference implementation S-100 viewer) prior to commit 753cf29 contain a remote code execution vulnerability via an unrestricted Lua interpreter. The Portrayal Engine initializes Lua ...
Original description
OpenS100 (the reference implementation S-100 viewer) prior to commit 753cf29 contain a remote code execution vulnerability via an unrestricted Lua interpreter. The Portrayal Engine initializes Lua using luaL_openlibs() without sandboxing or capability restrictions, exposing standard libraries such as 'os' and 'io' to untrusted portrayal catalogues. An attacker can provide a malicious S-100 portrayal catalogue containing Lua scripts that execute arbitrary commands with the privileges of the OpenS100 process when a user imports the catalogue and loads a chart.
nvd CVSS3.1 9.6
nvd CVSS4.0 9.4
Vulnerability type
CWE-749
CWE-829
Published: 17 Feb 2026 · Updated: 11 Mar 2026 · First seen: 6 Mar 2026