Impact
An attacker can manipulate the arguments passed to the registerXcodeTools function in the run_lldb component of xcode-mcp-server, leading to command injection that can be triggered remotely. This flaw permits arbitrary command execution on the host system, allowing full compromise of confidentiality, integrity, and availability of the affected machine.
Affected Systems
The vulnerability affects all releases of r-huijts xcode-mcp-server up to the commit f3419f00117aa9949e326f78cc940166c88f18cb. Because the project follows a rolling release model, specific version numbers for the fix are not publicly defined; the fix is provided by commit 11f8d6bacadd153beee649f92a78a9dad761f56f.
Risk and Exploitability
The CVSS score is 5.3, indicating a moderate severity, and the EPSS score is below 1%, suggesting a low probability of exploitation. The vulnerability is not listed in the CISA KEV catalog. Based on the description, the likely attack vector is remote exploitation by an attacker supplying crafted arguments to the registerXcodeTools command. The presence of a public exploit demonstrates that the attack is feasible without additional privileges.
OpenCVE Enrichment
Github GHSA