Description
eBay API MCP Server is an open source local MCP server providing AI assistants with comprehensive access to eBay's Sell APIs. All versions are vulnerable to Environment Variable Injection through the updateEnvFile function. The ebay_set_user_tokens tool allows updating the .env file with new tokens. The updateEnvFile function in src/auth/oauth.ts blindly appends or replaces values without validating them for newlines or quotes. This allows an attacker to inject arbitrary environment variables into the configuration file. An attacker can inject arbitrary environment variables into the .env file. This could lead to configuration overwrites, Denial of Service, and potential RCE. There was no fix for this issue at the time of publication.
Published: 2026-02-20
Score: 8.3 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution via environment variable injection
Action: Assess Impact
AI Analysis

Impact

The vulnerability in the eBay API MCP Server allows attackers to inject arbitrary environment variables into the server’s .env configuration file by exploiting how the updateEnvFile function processes input from the ebay_set_user_tokens tool. This environment variable injection can overwrite critical configuration values, potentially leading to configuration tampering, denial of service, or, in the worst case, remote code execution if the injected variables influence executable code paths. The flaw is a classic case of uncontrolled input leading to improper handling of environment data, classified under CWE‑15 (Improper Handling of Environment Variables) and CWE‑74 (Improper Validation of String or Buffer).

Affected Systems

All releases of the open‑source eBay API MCP Server provided by the developer YosefHayim are affected. The issue exists in the src/auth/oauth.ts module of the project, and applies to every version that has not yet been patched by the maintainer. No specific product version ranges are listed, so any deployment of ebay‑mcp that incorporates the unauthenticated updateEnvFile function remains vulnerable.

Risk and Exploitability

This flaw carries a CVSS v3.1 score of 8.3, indicating a high severity. The EPSS score is listed as less than 1%, implying a very low probability of exploitation in the wild, and the vulnerability is not yet catalogued in the CISA KEV list. In practice an attacker would need to gain some form of execution or influence over the ebay_set_user_tokens utility or the input it consumes; the most likely attack vector is local or privileged access that allows modification of the .env file or injection of malformed data via the tool. Because the flaw permits arbitrary environment variables to be written, the risk escalates if an attacker can subsequently trigger those variables in a context that leads to code execution.

Generated by OpenCVE AI on April 17, 2026 at 16:58 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Disable or restrict use of the ebay_set_user_tokens tool until an official fix is available.
  • Manually audit and clean the .env file to remove any unauthorized variables, and apply strict input validation when adding new entries.
  • Apply the vendor’s patch or upgrade to the latest version of eBay API MCP Server as soon as it is released and monitor the project's security advisories for further information.

Generated by OpenCVE AI on April 17, 2026 at 16:58 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-97rm-xj73-33jh eBay API MCP Server Affected by Environment Variable Injection
History

Wed, 25 Feb 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 23 Feb 2026 15:00:00 +0000

Type Values Removed Values Added
First Time appeared Yosefhayim
Yosefhayim ebay-mcp
Vendors & Products Yosefhayim
Yosefhayim ebay-mcp

Fri, 20 Feb 2026 23:45:00 +0000

Type Values Removed Values Added
Description eBay API MCP Server is an open source local MCP server providing AI assistants with comprehensive access to eBay's Sell APIs. All versions are vulnerable to Environment Variable Injection through the updateEnvFile function. The ebay_set_user_tokens tool allows updating the .env file with new tokens. The updateEnvFile function in src/auth/oauth.ts blindly appends or replaces values without validating them for newlines or quotes. This allows an attacker to inject arbitrary environment variables into the configuration file. An attacker can inject arbitrary environment variables into the .env file. This could lead to configuration overwrites, Denial of Service, and potential RCE. There was no fix for this issue at the time of publication.
Title eBay API MCP Server Affected by Environment Variable Injection
Weaknesses CWE-15
CWE-74
References
Metrics cvssV3_1

{'score': 8.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H'}


Subscriptions

Yosefhayim Ebay-mcp
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-02-25T21:29:27.100Z

Reserved: 2026-02-18T19:47:02.155Z

Link: CVE-2026-27203

cve-icon Vulnrichment

Updated: 2026-02-25T21:29:20.944Z

cve-icon NVD

Status : Deferred

Published: 2026-02-21T00:16:17.463

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-27203

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T17:00:10Z

Weaknesses