Description
github-kanban-mcp-server execAsync Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of github-kanban-mcp-server. Authentication is not required to exploit this vulnerability.

The specific flaw exists within the handling of the create_issue parameter. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-27784.
Published: 2026-01-23
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

This vulnerability is a command injection flaw that occurs when the server processes the create_issue parameter without validating the supplied string. An attacker can send a specially crafted request to an affected instance, causing the service to execute arbitrary shell commands in the context of the service account. The flaw is pure injection; no privilege escalation is required beyond the service account’s permissions, but the impact is complete loss of confidentiality, integrity, and availability for that server, as attackers can run any code they wish.

Affected Systems

The affected product is github-kanban-mcp-server. No specific version range is listed in the CVE record; therefore any installation of github-kanban-mcp-server that has not applied a vendor‑released fix is considered at risk.

Risk and Exploitability

The CVSS score of 9.8 indicates maximum severity, while the EPSS score of less than 1% suggests that exploitation attempts are expected to be rare at present. The vulnerability is not listed in CISA's KEV catalog, so there is no evidence of widespread or active exploitation. An attacker does not need prior authentication; the flaw can be leveraged from the internet or an internal network if the create_issue endpoint is exposed. The attack path is simple: send a crafted create_issue request that injects shell commands, and the server executes them with the privileges of the service account.

Generated by OpenCVE AI on April 18, 2026 at 03:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update github-kanban-mcp-server to the latest release that contains the command injection fix.
  • If a patch is not yet available, block or restrict external access to the create_issue API endpoint, or otherwise limit unauthenticated users from reaching the vulnerable parameter.
  • As a temporary measure, validate or escape the create_issue parameter on the server side to prevent arbitrary command execution until the official fix is applied.

Generated by OpenCVE AI on April 18, 2026 at 03:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 23 Jan 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 23 Jan 2026 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Github-kanban-mcp-server
Github-kanban-mcp-server github-kanban-mcp-server
Vendors & Products Github-kanban-mcp-server
Github-kanban-mcp-server github-kanban-mcp-server

Fri, 23 Jan 2026 04:00:00 +0000

Type Values Removed Values Added
Description github-kanban-mcp-server execAsync Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of github-kanban-mcp-server. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of the create_issue parameter. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-27784.
Title github-kanban-mcp-server execAsync Command Injection Remote Code Execution Vulnerability
Weaknesses CWE-78
References
Metrics cvssV3_0

{'score': 9.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Github-kanban-mcp-server Github-kanban-mcp-server
cve-icon MITRE

Status: PUBLISHED

Assigner: zdi

Published:

Updated: 2026-01-23T19:33:45.238Z

Reserved: 2026-01-08T22:49:27.448Z

Link: CVE-2026-0756

cve-icon Vulnrichment

Updated: 2026-01-23T19:33:39.380Z

cve-icon NVD

Status : Deferred

Published: 2026-01-23T04:16:02.157

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-0756

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T03:30:25Z

Weaknesses