VYPR
Critical severity9.0NVD Advisory· Published May 20, 2026· Updated May 20, 2026

CVE-2026-22314

CVE-2026-22314

Description

Improper Control of Generation of Code ('Code Injection') vulnerability in Mesalvo Meona Client Launcher Component, Mesalvo Meona Server Component enables code execution on other users' systems. This issue affects Meona Client Launcher Component: through 19.06.2020 15:11:49; Meona Server Component: through 2025.04 5+323020.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Code injection in Meona Client Launcher and Server allows remote code execution on other users' systems.

Vulnerability

A code injection vulnerability exists in the Mesalvo Meona Client Launcher Component (through version 19.06.2020 15:11:49) and the Meona Server Component (through version 2025.04 5+323020). The improper control of code generation allows an attacker to inject and execute arbitrary code on other users' systems. The exact conditions required to trigger the vulnerability are not detailed in the available references [1].

Exploitation

Not yet disclosed in the available references. The blog post [1] indicates that some technical details are being withheld until final patches are released.

Impact

Successful exploitation enables an attacker to execute arbitrary code on other users' systems, potentially leading to full compromise of those systems and access to sensitive healthcare data.

Mitigation

Not yet disclosed in the available references. No fixed version or workaround has been published as of the advisory date. Users should monitor vendor communications for updates.

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.