OpenS100 (the reference implementation S-100 viewer)...
Critical severity
Unreviewed
Published
Feb 17, 2026
to the GitHub Advisory Database
•
Updated Feb 17, 2026
Description
Published by the National Vulnerability Database
Feb 17, 2026
Published to the GitHub Advisory Database
Feb 17, 2026
Last updated
Feb 17, 2026
OpenS100 (the reference implementation S-100 viewer) prior to commit 753cf29 contain a remote code execution vulnerability via an unrestricted Lua interpreter. The Portrayal Engine initializes Lua using luaL_openlibs() without sandboxing or capability restrictions, exposing standard libraries such as 'os' and 'io' to untrusted portrayal catalogues. An attacker can provide a malicious S-100 portrayal catalogue containing Lua scripts that execute arbitrary commands with the privileges of the OpenS100 process when a user imports the catalogue and loads a chart.
References