|
[Japanese]
|
JVNDB-2026-000037
|
OpenLiteSpeed and LSWS Enterprise vulnerable to OS command injection
|
OpenLiteSpeed and LSWS Enterprise provided by LiteSpeed Technologies contain the following vulnerability.- OS command injection (CWE-78) - CVE-2026-31386
Daisuke Nakayama of Mizuho Financial Group, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
|
CVSS V3 Severity: Base Metrics 7.2 (High) [IPA Score]
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: High
- User Interaction: None
- Scope: Unchanged
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
|
CVSS v4 Severity
Base Metrics: 8.6 (High) [IPA Score]
- Access Vector (AV): Network
- Attack Complexity (AC): Low
- Attack Requirements (AT): None
- Privileges Required (PR): High
- User Interaction (UI): None
Vulnerable System Impact
- Confidentiality Impact (VC): High
- Integrity Impact (VI): High
- Availability Impact (VA): High
Subsequent System Impact
- Confidentiality Impact (SC): None
- Integrity Impact (SI): None
- Availability Impact (SA): None
|
|
LiteSpeed Technologies
- LSWS Enterprise all versions
- OpenLiteSpeed all versions
|
|
An arbitrary OS command may be executed by an attacker with the administrative privilege.
|
[Apply the Workaround]
The developer recommends users apply the following workaround. - Restrict access to the port used by the WebAdmin console and/or allow connections only from trusted IP addresses.
|
LiteSpeed Technologies
|
- OS Command Injection(CWE-78) [IPA Evaluation]
|
- CVE-2026-31386
|
- JVN : JVN#22152812
|
- [2026/03/16]
Web page was published
|