Impact
A command injection vulnerability is present in the minimal_wrapper.py component of kubectl-mcp-server v1.2.0. The flaw allows an attacker to inject arbitrary shell metacharacters, permitting the execution of any command on the host where the wrapper runs. This represents a high‑severity remote code execution risk, as depicted by a CVSS score of 9.8, and can compromise system confidentiality, integrity, and availability.
Affected Systems
The affected product is kubectl-mcp-server version 1.2.0, particularly the minimal_wrapper.py module used for command execution. Systems running this version and exploiting the minimal wrapper are susceptible; no vendor/product mapping was provided by the CNA.
Risk and Exploitability
The vulnerability carries a CVSS score of 9.8 and an EPSS score of less than 1 %, indicating low probability of exploitation but high impact. It is not listed in the CISA KEV catalog. The likely attack vector is local or network-based access to the wrapper script that can inject shell metacharacters; this inference is made based on the description of arbitrary command execution. Exploitation requires the ability to supply input to the wrapper, after which the injected shell metacharacters are executed by the operating system.
OpenCVE Enrichment