Impact
The flaw is a local command injection defect in the shortcutName parameter of the mcp-server-siri-shortcuts service. Unsanitized user input is passed to a system call, enabling an attacker who can run code with limited privileges to elevate those privileges and execute arbitrary code as the service account. The vulnerability provides direct compromise of confidentiality, integrity and availability for the overall system.
Affected Systems
The affected product is mcp-server-siri-shortcuts. Version details are not specified in the available data, so any installation of this service that has not been updated to include the vendor patch is potentially vulnerable.
Risk and Exploitability
The CVSS score of 7.8 classifies the defect as High severity, yet the EPSS score of less than 1% indicates a very low likelihood of exploitation in the wild. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires an attacker to first execute low-privileged code on the same machine—a prerequisite that confines the attack to a local threat model. Once that foothold is achieved, the attacker can inject a malicious shortcutName string to trigger the privileged system call and gain elevated rights.
OpenCVE Enrichment