CVE-2026-22314
Description
Improper Control of Generation of Code ('Code Injection') vulnerability in Mesalvo Meona Client Launcher Component, Mesalvo Meona Server Component enables code execution on other users' systems. This issue affects Meona Client Launcher Component: through 19.06.2020 15:11:49; Meona Server Component: through 2025.04 5+323020.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Code injection in Meona Client Launcher and Server allows remote code execution on other users' systems.
Vulnerability
A code injection vulnerability exists in the Mesalvo Meona Client Launcher Component (through version 19.06.2020 15:11:49) and the Meona Server Component (through version 2025.04 5+323020). The improper control of code generation allows an attacker to inject and execute arbitrary code on other users' systems. The exact conditions required to trigger the vulnerability are not detailed in the available references [1].
Exploitation
Not yet disclosed in the available references. The blog post [1] indicates that some technical details are being withheld until final patches are released.
Impact
Successful exploitation enables an attacker to execute arbitrary code on other users' systems, potentially leading to full compromise of those systems and access to sensitive healthcare data.
Mitigation
Not yet disclosed in the available references. No fixed version or workaround has been published as of the advisory date. Users should monitor vendor communications for updates.
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2- Range: <= 19.06.2020 15:11:49
- Range: <= 2025.04 5+323020
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.