Impact
The vulnerability resides in the biome‑mcp‑server project in the file biome‑mcp‑server.ts and allows an attacker to inject and execute arbitrary operating‑system commands. Input is not properly validated, leading to a classic command injection flaw. An attacker can trigger the flaw remotely without any special privileges, potentially compromising the entire host where the server is running.
Affected Systems
The issue affects RyuzakiShinji’s biome‑mcp‑server up to version 1.0.0. Any deployment that has not incorporated the official patch or a newer version beyond 1.0.0 is vulnerable.
Risk and Exploitability
With a CVSS score of 5.3 and an EPSS score of 2%, the vulnerability is considered moderate but not rare. The exploit has already been released publicly and could be used in remote attacks. The vulnerability is not listed in CISA’s KEV catalog, but its remote nature and the availability of a public exploit raise significant risk. The recommended mitigation is to apply the patch identified by commit 335e1727147efeef011f1ff8b05dd751d8a660be immediately.
OpenCVE Enrichment