The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade @openclaw/lobster to version 2026.2.19 or higher.
@openclaw/lobster is an Adds the lobster agent tool as an optional plugin tool.
Affected versions of this package are vulnerable to Command Injection via the fallback process on Windows systems when certain spawn failures occur and shell: true is used. An attacker can execute arbitrary commands by supplying crafted arguments that are interpreted by cmd.exe if the fallback is triggered. This is only exploitable if the application is running on Windows, the fallback path is triggered (such as by specific spawn errors), and the attacker has control over the arguments passed through a local workflow.