Description
MCP Manager for Claude Desktop execute-command Command Injection Sandbox Escape Vulnerability. This vulnerability allows remote attackers to bypass the sandbox on affected installations of MCP Manager for Claude Desktop. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

The specific flaw exists within the processing of MCP config objects. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to escape the sandbox and execute arbitrary code in the context of the current process at medium integrity. Was ZDI-CAN-27810.
Published: 2026-01-23
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Arbitrary code execution via command injection and sandbox escape
Action: Apply vendor patch
AI Analysis

Impact

An OS command injection flaw exists in the processing of MCP config objects because a user‑supplied string is not validated before being used in a system call. An attacker can take advantage of this to execute arbitrary commands in the context of the running MCP Manager process, achieving a sandbox escape. The consequence is compromise of confidentiality and integrity of the host at medium integrity level.

Affected Systems

MCP Manager for Claude Desktop, the desktop management application, is affected. No specific version range is available in the CNA data, so all installed copies of the product are potentially vulnerable.

Risk and Exploitability

The CVSS score of 8.8 indicates a high severity vulnerability, but the EPSS score of less than 1 percent and the need for user interaction (the victim must visit a malicious page or open a malicious file) imply a low to medium likelihood of exploitation. This vulnerability is currently not listed in the CISA KEV catalog. The likely attack vector is impersonation via malicious content that requires user action to trigger the command injection.

Generated by OpenCVE AI on April 18, 2026 at 03:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Install the vendor‑issued fix or upgrade MCP Manager for Claude Desktop to the latest version.
  • Block or quarantine untrusted files and disable automatic opening of files from untrusted sources to reduce user‑interaction risk.
  • Implement monitoring of process creation and command execution and review logs for anomalous activity.

Generated by OpenCVE AI on April 18, 2026 at 03:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 23 Jan 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 23 Jan 2026 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Mcp Manager For Claude Desktop
Mcp Manager For Claude Desktop mcp Manager For Claude Desktop
Vendors & Products Mcp Manager For Claude Desktop
Mcp Manager For Claude Desktop mcp Manager For Claude Desktop

Fri, 23 Jan 2026 04:00:00 +0000

Type Values Removed Values Added
Description MCP Manager for Claude Desktop execute-command Command Injection Sandbox Escape Vulnerability. This vulnerability allows remote attackers to bypass the sandbox on affected installations of MCP Manager for Claude Desktop. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of MCP config objects. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to escape the sandbox and execute arbitrary code in the context of the current process at medium integrity. Was ZDI-CAN-27810.
Title MCP Manager for Claude Desktop execute-command Command Injection Sandbox Escape Vulnerability
Weaknesses CWE-78
References
Metrics cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}


Subscriptions

Mcp Manager For Claude Desktop Mcp Manager For Claude Desktop
cve-icon MITRE

Status: PUBLISHED

Assigner: zdi

Published:

Updated: 2026-01-23T19:32:37.049Z

Reserved: 2026-01-08T22:49:32.384Z

Link: CVE-2026-0757

cve-icon Vulnrichment

Updated: 2026-01-23T19:32:25.457Z

cve-icon NVD

Status : Deferred

Published: 2026-01-23T04:16:02.297

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-0757

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T03:30:25Z

Weaknesses