Description
OpenLiteSpeed and LSWS Enterprise provided by LiteSpeed Technologies contain an OS command injection vulnerability. An arbitrary OS command may be executed by an attacker with the administrative privilege.
Published: 2026-03-16
Score: 8.6 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Command Execution via Administrative Privilege
Action: Immediate Patch
AI Analysis

Impact

OpenLiteSpeed and LSWS Enterprise contain an OS command injection vulnerability that allows an attacker with administrative credentials to execute arbitrary operating system commands. This flaw is a classic example of CWE-78 (OS Command Injection) and can lead to full compromise of the targeted server, affecting confidentiality, integrity, and availability of all services hosted on the affected machine.

Affected Systems

The affected vendors and products are LiteSpeed Technologies: LSWS Enterprise and LiteSpeed Technologies: OpenLiteSpeed. No specific affected version ranges were provided in the CNA information, so all installations of these products are potentially vulnerable until a patch is applied.

Risk and Exploitability

The CVSS v3.1 score of 8.6 classifies the vulnerability as ‘High’ severity, indicating the potential for significant impact if exploited. The EPSS score of less than 1% suggests low probability of exploitation in the near term, and the vulnerability is not listed in the CISA KEV catalog. However, the likely attack vector requires administrative access, implying that it is exploitable once an attacker or compromised admin account gains entry. Given the severity, systems should treat this as a priority risk.

Generated by OpenCVE AI on March 17, 2026 at 11:43 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the vendor‑released patch for OpenLiteSpeed and LSWS Enterprise as soon as it becomes available.
  • If a patch is not yet released, limit the administrative interface to trusted IP addresses and enforce multi‑factor authentication.
  • Consider disabling or restricting features that allow arbitrary command execution, if supported by configuration.
  • Continuously monitor for new advisories from LiteSpeed Technologies and apply updates promptly.

Generated by OpenCVE AI on March 17, 2026 at 11:43 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 24 Mar 2026 13:30:00 +0000

Type Values Removed Values Added
Title Admin Command Injection Vulnerability in LiteSpeed OpenLiteSpeed and LSWS Enterprise

Tue, 17 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Litespeed Technologies
Litespeed Technologies lsws Enterprise
Litespeed Technologies openlitespeed
Vendors & Products Litespeed Technologies
Litespeed Technologies lsws Enterprise
Litespeed Technologies openlitespeed

Mon, 16 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 16 Mar 2026 05:30:00 +0000

Type Values Removed Values Added
Description OpenLiteSpeed and LSWS Enterprise provided by LiteSpeed Technologies contain an OS command injection vulnerability. An arbitrary OS command may be executed by an attacker with the administrative privilege.
Weaknesses CWE-78
References
Metrics cvssV3_0

{'score': 7.2, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.6, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Litespeed Technologies Lsws Enterprise Openlitespeed
cve-icon MITRE

Status: PUBLISHED

Assigner: jpcert

Published:

Updated: 2026-03-16T15:29:03.838Z

Reserved: 2026-03-09T09:07:18.132Z

Link: CVE-2026-31386

cve-icon Vulnrichment

Updated: 2026-03-16T15:28:59.211Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-16T14:19:33.170

Modified: 2026-03-16T14:53:07.390

Link: CVE-2026-31386

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-24T10:45:48Z

Weaknesses