Description
A security flaw has been discovered in RyuzakiShinji biome-mcp-server up to 1.0.0. Affected by this issue is some unknown functionality of the file biome-mcp-server.ts. Performing a manipulation results in command injection. The attack can be initiated remotely. The exploit has been released to the public and may be used for attacks. The patch is named 335e1727147efeef011f1ff8b05dd751d8a660be. Applying a patch is the recommended action to fix this issue.
Published: 2026-03-07
Score: 5.3 Medium
EPSS: 1.5% Low
KEV: No
Impact: Remote Command Execution
Action: Immediate Patch
AI Analysis

Impact

The vulnerability resides in the biome‑mcp‑server project in the file biome‑mcp‑server.ts and allows an attacker to inject and execute arbitrary operating‑system commands. Input is not properly validated, leading to a classic command injection flaw. An attacker can trigger the flaw remotely without any special privileges, potentially compromising the entire host where the server is running.

Affected Systems

The issue affects RyuzakiShinji’s biome‑mcp‑server up to version 1.0.0. Any deployment that has not incorporated the official patch or a newer version beyond 1.0.0 is vulnerable.

Risk and Exploitability

With a CVSS score of 5.3 and an EPSS score of 2%, the vulnerability is considered moderate but not rare. The exploit has already been released publicly and could be used in remote attacks. The vulnerability is not listed in CISA’s KEV catalog, but its remote nature and the availability of a public exploit raise significant risk. The recommended mitigation is to apply the patch identified by commit 335e1727147efeef011f1ff8b05dd751d8a660be immediately.

Generated by OpenCVE AI on April 16, 2026 at 10:44 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the official patch identified by commit 335e1727147efeef011f1ff8b05dd751d8a660be to the biome-mcp-server source code or deploy a newer patched release.
  • Sanitize all input parameters received by biome-mcp-server and remove any calls that allow raw command execution.
  • Restrict network exposure of biome-mcp-server to trusted users or subnets and enforce strict access controls so that only authorized systems can invoke the affected functionalities.

Generated by OpenCVE AI on April 16, 2026 at 10:44 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 11 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 09 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Ryuzakishinji
Ryuzakishinji biome-mcp-server
Vendors & Products Ryuzakishinji
Ryuzakishinji biome-mcp-server

Sat, 07 Mar 2026 23:15:00 +0000

Type Values Removed Values Added
Description A security flaw has been discovered in RyuzakiShinji biome-mcp-server up to 1.0.0. Affected by this issue is some unknown functionality of the file biome-mcp-server.ts. Performing a manipulation results in command injection. The attack can be initiated remotely. The exploit has been released to the public and may be used for attacks. The patch is named 335e1727147efeef011f1ff8b05dd751d8a660be. Applying a patch is the recommended action to fix this issue.
Title RyuzakiShinji biome-mcp-server biome-mcp-server.ts command injection
Weaknesses CWE-74
CWE-77
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Ryuzakishinji Biome-mcp-server
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-11T16:27:56.353Z

Reserved: 2026-03-06T21:24:54.471Z

Link: CVE-2026-3680

cve-icon Vulnrichment

Updated: 2026-03-11T16:22:55.090Z

cve-icon NVD

Status : Deferred

Published: 2026-03-07T23:15:47.850

Modified: 2026-04-22T21:27:27.950

Link: CVE-2026-3680

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T10:45:26Z

Weaknesses