<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>OpenShell — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/openshell/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 24 Apr 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/openshell/feed.xml" rel="self" type="application/rss+xml"/><item><title>OpenShell Arbitrary Code Execution Vulnerability (CVE-2026-41355)</title><link>https://feed.craftedsignal.io/briefs/2026-04-openshell-rce/</link><pubDate>Fri, 24 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-openshell-rce/</guid><description>OpenShell before 2026.3.28 is vulnerable to arbitrary code execution via mirror mode when converting untrusted sandbox files into workspace hooks, allowing attackers with mirror mode access to execute code during gateway startup.</description><content:encoded><![CDATA[<p>OpenShell, a popular start menu replacement for Windows, is vulnerable to arbitrary code execution. Specifically, versions prior to 2026.3.28 are susceptible to CVE-2026-41355, which allows attackers with &ldquo;mirror mode&rdquo; access to execute arbitrary code. This vulnerability stems from the insecure conversion of untrusted sandbox files into workspace hooks. An attacker can leverage this flaw to inject malicious code that executes during the OpenShell gateway startup process, gaining control over the host system. This poses a significant risk to systems where OpenShell is used, especially in environments where multiple users or sandboxed applications are present. Successful exploitation allows for complete system compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains low-privilege access to a system with OpenShell installed and &ldquo;mirror mode&rdquo; enabled.</li>
<li>The attacker crafts a malicious sandbox file containing embedded code.</li>
<li>The attacker leverages OpenShell&rsquo;s mirror mode to convert the untrusted sandbox file into a workspace hook.</li>
<li>OpenShell improperly handles the conversion, failing to sanitize the malicious code within the workspace hook.</li>
<li>The system restarts or the OpenShell gateway service is initialized.</li>
<li>During the gateway startup, OpenShell executes the injected malicious code from the compromised workspace hook.</li>
<li>The attacker gains arbitrary code execution within the context of the OpenShell process.</li>
<li>The attacker escalates privileges or performs other malicious actions, such as installing malware or exfiltrating data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-41355 allows an attacker to execute arbitrary code on a vulnerable system. This can lead to complete system compromise, including data theft, malware installation, and denial of service. The vulnerability is particularly dangerous in multi-user environments or systems using sandboxed applications, as it allows attackers to break out of the sandbox and gain control over the host. While the exact number of affected systems is unknown, any system running OpenShell prior to version 2026.3.28 with mirror mode enabled is potentially vulnerable.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade OpenShell to version 2026.3.28 or later to patch CVE-2026-41355.</li>
<li>Disable &ldquo;mirror mode&rdquo; in OpenShell if it is not required, reducing the attack surface.</li>
<li>Implement the Sigma rule <code>DetectSuspiciousOpenShellMirrorMode</code> to detect potential exploitation attempts by monitoring process creations related to OpenShell with specific command-line arguments.</li>
<li>Enable process creation logging to activate the <code>DetectSuspiciousOpenShellMirrorMode</code> Sigma rule.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve</category><category>rce</category><category>openshell</category></item></channel></rss>