Description
A vulnerability was identified in XixianLiang HarmonyOS-mcp-server 0.1.0. This vulnerability affects the function input_text. The manipulation of the argument text leads to os command injection. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.
Published: 2026-02-08
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Assess Impact
AI Analysis

Impact

The vulnerability is an OS command injection flaw in the input_text function of XixianLiang HarmonyOS‑mcp‑server. By manipulating the \"text\" argument, an attacker can cause the server to execute arbitrary operating‑system commands. The weakness is represented by CWE‑77 and CWE‑78 and can lead to full system compromise if exploited, providing the attacker’s privileges on the server.\n

Affected Systems

XixianLiang HarmonyOS‑mcp‑server version 0.1.0

Risk and Exploitability

This vulnerability carries a CVSS score of 5.3, indicating moderate risk, and an EPSS score of less than 1 %, suggesting very low probability of being seen in the wild at present. Because the flaw permits remote execution of arbitrary commands via the input_text endpoint, an attacker who can reach the server over the network could inject commands and gain the privileges of the running service. The existence of publicly available exploits and the lack of any current mitigation in the CISA KEV catalog underscore the potential for exploitation, though the low EPSS score mitigates immediate threat. The vulnerability could be leveraged to compromise the host or pivot to other services if the server runs with elevated privileges. Existing security controls such as limiting network exposure and enforcing least‑privilege execution can reduce the risk.

Generated by OpenCVE AI on April 18, 2026 at 13:18 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check for an official vendor patch or fix for HarmonyOS‑mcp‑server 0.1.0
  • Sanitize and validate the \"text\" input to prevent command injection, rejecting or escaping shell meta characters
  • Run the server with the least privileges necessary and disable shell execution where possible
  • Restrict network access to the service using firewalls or segmentation to limit exposure to the attack surface

Generated by OpenCVE AI on April 18, 2026 at 13:18 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 05 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Xixianliang harmonyos Mcp Server
CPEs cpe:2.3:a:xixianliang:harmonyos_mcp_server:0.1.0:*:*:*:*:*:*:*
Vendors & Products Xixianliang harmonyos Mcp Server

Tue, 10 Feb 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 09 Feb 2026 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Xixianliang
Xixianliang harmonyos-mcp-server
Vendors & Products Xixianliang
Xixianliang harmonyos-mcp-server

Sun, 08 Feb 2026 03:00:00 +0000

Type Values Removed Values Added
Description A vulnerability was identified in XixianLiang HarmonyOS-mcp-server 0.1.0. This vulnerability affects the function input_text. The manipulation of the argument text leads to os command injection. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.
Title XixianLiang HarmonyOS-mcp-server input_text os command injection
Weaknesses CWE-77
CWE-78
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Xixianliang Harmonyos-mcp-server Harmonyos Mcp Server
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T09:37:10.319Z

Reserved: 2026-02-06T20:52:48.170Z

Link: CVE-2026-2131

cve-icon Vulnrichment

Updated: 2026-02-10T19:45:36.796Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-08T03:15:49.047

Modified: 2026-03-05T20:12:07.977

Link: CVE-2026-2131

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T13:30:45Z

Weaknesses