Description
A vulnerability was found in r-huijts xcode-mcp-server up to f3419f00117aa9949e326f78cc940166c88f18cb. This affects the function registerXcodeTools of the file src/tools/xcode/index.ts of the component run_lldb. The manipulation of the argument args results in command injection. It is possible to launch the attack remotely. The exploit has been made public and could be used. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available. The patch is identified as 11f8d6bacadd153beee649f92a78a9dad761f56f. Applying a patch is advised to resolve this issue.
Published: 2026-02-08
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote Command Execution
Action: Patch Immediately
AI Analysis

Impact

An attacker can manipulate the arguments passed to the registerXcodeTools function in the run_lldb component of xcode-mcp-server, leading to command injection that can be triggered remotely. This flaw permits arbitrary command execution on the host system, allowing full compromise of confidentiality, integrity, and availability of the affected machine.

Affected Systems

The vulnerability affects all releases of r-huijts xcode-mcp-server up to the commit f3419f00117aa9949e326f78cc940166c88f18cb. Because the project follows a rolling release model, specific version numbers for the fix are not publicly defined; the fix is provided by commit 11f8d6bacadd153beee649f92a78a9dad761f56f.

Risk and Exploitability

The CVSS score is 5.3, indicating a moderate severity, and the EPSS score is below 1%, suggesting a low probability of exploitation. The vulnerability is not listed in the CISA KEV catalog. Based on the description, the likely attack vector is remote exploitation by an attacker supplying crafted arguments to the registerXcodeTools command. The presence of a public exploit demonstrates that the attack is feasible without additional privileges.

Generated by OpenCVE AI on April 18, 2026 at 13:10 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the identified commit 11f8d6bacadd153beee649f92a78a9dad761f56f to the xcode-mcp-server source and redeploy the service
  • Deploy a newer release of xcode-mcp-server that incorporates the fix
  • If an immediate patch is not possible, restrict network access to the run_lldb component to prevent remote exploitation

Generated by OpenCVE AI on April 18, 2026 at 13:10 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-84fx-pwf3-7777 xcode-mcp-server vulnerable to Command Injection
History

Thu, 05 Mar 2026 21:45:00 +0000

Type Values Removed Values Added
First Time appeared R-huijts xcode Mcp Server
CPEs cpe:2.3:a:r-huijts:xcode_mcp_server:*:*:*:*:*:*:*:*
Vendors & Products R-huijts xcode Mcp Server

Mon, 09 Feb 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 09 Feb 2026 11:00:00 +0000

Type Values Removed Values Added
First Time appeared R-huijts
R-huijts xcode-mcp-server
Vendors & Products R-huijts
R-huijts xcode-mcp-server

Sun, 08 Feb 2026 19:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in r-huijts xcode-mcp-server up to f3419f00117aa9949e326f78cc940166c88f18cb. This affects the function registerXcodeTools of the file src/tools/xcode/index.ts of the component run_lldb. The manipulation of the argument args results in command injection. It is possible to launch the attack remotely. The exploit has been made public and could be used. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available. The patch is identified as 11f8d6bacadd153beee649f92a78a9dad761f56f. Applying a patch is advised to resolve this issue.
Title r-huijts xcode-mcp-server run_lldb index.ts registerXcodeTools command injection
Weaknesses CWE-74
CWE-77
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

R-huijts Xcode-mcp-server Xcode Mcp Server
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T09:47:43.782Z

Reserved: 2026-02-07T15:13:49.484Z

Link: CVE-2026-2178

cve-icon Vulnrichment

Updated: 2026-02-09T17:40:05.311Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-08T19:16:22.313

Modified: 2026-03-05T21:30:51.063

Link: CVE-2026-2178

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T13:15:25Z

Weaknesses