No analysis available yet.
No remediation available yet.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-20505 | Node.js Sandbox MCP Server vulnerability can lead to Sandbox Escape via Command Injection |
Github GHSA |
GHSA-5w57-2ccq-8w95 | Node.js Sandbox MCP Server vulnerability can lead to Sandbox Escape via Command Injection |
Mon, 14 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Tue, 08 Jul 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 08 Jul 2025 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | node-code-sandbox-mcp is a Node.js–based Model Context Protocol server that spins up disposable Docker containers to execute arbitrary JavaScript. Prior to 1.3.0, a command injection vulnerability exists in the node-code-sandbox-mcp MCP Server. The vulnerability is caused by the unsanitized use of input parameters within a call to child_process.execSync, enabling an attacker to inject arbitrary system commands. Successful exploitation can lead to remote code execution under the server process's privileges on the host machine, bypassing the sandbox protection of running code inside docker. This vulnerability is fixed in 1.3.0. | |
| Title | node-code-sandbox-mcp has a Sandbox Escape via Command Injection | |
| Weaknesses | CWE-77 | |
| References |
| |
| Metrics |
cvssV3_1
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-07-08T15:08:00.399Z
Reserved: 2025-06-27T12:57:16.122Z
Link: CVE-2025-53372
Updated: 2025-07-08T15:07:42.485Z
Status : Deferred
Published: 2025-07-08T15:15:29.560
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-53372
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA