Impact
sf-mcp-server contains a command injection flaw caused by unsafe use of child_process.exec when building Salesforce CLI commands with user supplied data. An attacker who can influence the input to the query_records tool can cause the server to execute arbitrary shell commands with whatever privileges the MCP server process holds, allowing complete compromise of confidentiality, integrity, and availability. The weakness is identified as CWE-78.
Affected Systems
The vulnerability affects the sf-mcp-server product from akutishevsky. No specific version information was provided, so all releases may be impacted until a patch is applied.
Risk and Exploitability
The CVSS score of 7.5 indicates a high severity. The EPSS score of less than 1% suggests a low likelihood of exploitation at present, and the issue is not listed in the CISA KEV catalog. Based on the description, it is inferred that the vulnerability could be exploited by anyone able to supply input to the query_records tool—likely through local or component‑level access if the tool is exposed via API. Successful exploitation would grant an adversary the same privileges as the MCP server process.
OpenCVE Enrichment