CVE-2026-43990: JunoClaw Agentic AI Shell Injection Risk

CVE-2026-43990: JunoClaw Agentic AI Shell Injection Risk

The National Vulnerability Database has disclosed CVE-2026-43990, a high-severity vulnerability (CVSS 8.4) affecting the JunoClaw agentic AI platform. Prior to version 0.x.y-security-1, JunoClaw’s plugin-shell component improperly handled agent-supplied commands. Specifically, it wrapped every command in sh -c or cmd /C and passed the entire argument string directly to the shell’s parser.

This design flaw, categorized as CWE-77 (Command Injection) and CWE-78 (OS Command Injection), allowed shell metacharacters within agent-supplied arguments to be interpreted as command syntax. An attacker could leverage this to inject arbitrary commands, potentially leading to full system compromise, data exfiltration, or denial of service. The vulnerability is now patched in version 0.x.y-security-1.

This is a critical reminder of the inherent risks in integrating AI agents with direct shell access. The attacker’s calculus here is simple: find a way to break out of the agent’s intended sandbox and execute commands directly on the host. Defenders must scrutinize any system that provides agent-driven shell execution, ensuring robust input sanitization and strict command whitelisting.

What This Means For You

  • If your organization utilizes JunoClaw, prioritize patching to version 0.x.y-security-1 immediately. This vulnerability allows for shell injection, meaning an attacker could take full control of the underlying system. Review any custom agents or plugins for similar command execution patterns and ensure they are not vulnerable to shell metacharacter interpretation.

Related ATT&CK Techniques

🛡️ Detection Rules

2 rules · 6 SIEM formats

2 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.

high T1059.004 Execution

CVE-2026-43990: JunoClaw Agentic AI Shell Injection via Plugin

Sigma YAML — free preview
title: CVE-2026-43990: JunoClaw Agentic AI Shell Injection via Plugin
id: scw-2026-05-12-ai-1
status: experimental
level: high
description: |
  Detects the exploitation of CVE-2026-43990 by identifying processes like 'sh.exe' or 'cmd.exe' being invoked with 'sh -c' or 'cmd /C' and containing shell metacharacters, originating from a JunoClaw agent process. This indicates an attempt to inject shell commands through the vulnerable plugin.
author: SCW Feed Engine (AI-generated)
date: 2026-05-12
references:
  - https://shimiscyberworld.com/posts/nvd-CVE-2026-43990/
tags:
  - attack.execution
  - attack.t1059.004
logsource:
    category: process_creation
detection:
  selection:
      Image|endswith:
          - 'sh.exe'
          - 'cmd.exe'
      CommandLine|contains:
          - 'sh -c'
          - 'cmd /C'
      CommandLine|contains_any:
          - '`'
          - '|'
          - ';'
          - '&&'
          - '||'
          - '$()'
  selection_base:
      Image|contains:
          - 'junoclaw_agent'
  condition: selection AND selection_base
falsepositives:
  - Legitimate administrative activity

Source: Shimi's Cyber World · License & reuse

✓ Sigma · Splunk SPL Sentinel KQL Elastic QRadar AQL Wazuh Get rules for your SIEM →

Indicators of Compromise

IDTypeIndicator
CVE-2026-43990 Command Injection JunoClaw plugin-shell prior to version 0.x.y-security-1
CVE-2026-43990 Command Injection Vulnerable component: plugin-shell's run_command function
CVE-2026-43990 Command Injection Attack vector: agent-supplied arguments containing shell metacharacters
Source & Attribution
Source PlatformNVD
ChannelNational Vulnerability Database
PublishedMay 12, 2026 at 20:16 UTC

This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.

Believe this infringes your rights? Submit a takedown request.

Related coverage

Fortinet FortiAuthenticator Critical Improper Access Control Vulnerability

CVE-2026-44277 — A improper access control vulnerability in Fortinet FortiAuthenticator 8.0.2, FortiAuthenticator 8.0.0, FortiAuthenticator 6.6.0 through 6.6.8, FortiAuthenticator 6.5.0 through 6.5.6 may allow attacker to...

vulnerabilityCVEcriticalhigh-severityimproper-access-controlcwe-284
/SCW Vulnerability Desk /CRITICAL /9.8 /⚑ 4 IOCs /⚙ 3 Sigma

Pingvin Share X Critical 2FA Bypass (CVE-2026-44196)

CVE-2026-44196 — Pingvin Share X is a secure and easy self-hosted file sharing platform. From 1.14.1 to 1.16.2, a critical authentication bypass vulnerability allows an...

vulnerabilityCVEcriticalhigh-severityauthentication-bypasscwe-287cwe-697
/SCW Vulnerability Desk /CRITICAL /9.1 /⚑ 2 IOCs /⚙ 2 Sigma

Cleanuparr CVE-2026-44183: Critical RCE via X-Forwarded-For Header Spoofing

CVE-2026-44183 — Cleanuparr is a tool for automating the cleanup of unwanted or blocked files in Sonarr, Radarr, and supported download clients like qBittorrent. Prior...

vulnerabilityCVEcriticalhigh-severitycwe-290cwe-348
/SCW Vulnerability Desk /CRITICAL /9.8 /⚑ 3 IOCs /⚙ 2 Sigma