Description
A vulnerability was found in 0xKoda WireMCP up to 7f45f8b2b4adeb76be8c6227eefb38533fdd6b1e. Impacted is the function server.tool of the file index.js of the component Tshark CLI Command Handler. The manipulation results in os command injection. The attack needs to be approached locally. The exploit has been made public and could be used. This product utilizes a rolling release system for continuous delivery, and as such, version information for affected or updated releases is not disclosed. The project was informed of the problem early through an issue report but has not responded yet.
Published: 2026-03-11
Score: 4.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: OS Command Injection (Local)
Action: Assess Impact
AI Analysis

Impact

A local vulnerability exists in the server.tool function of index.js within the Tshark CLI Command Handler of 0xKoda WireMCP. The flaw allows an attacker with local access to manipulate input and trigger arbitrary OS command execution, exposing the system to integrity compromise. This is a classic OS command injection attack (CWE‑77/CWE‑78).

Affected Systems

Affected systems include deployments of 0xKoda WireMCP up to commit 7f45f8b2b4adeb76be8c6227eefb38533fdd6b1e. Because the project uses a rolling release model, exact released version numbers are not publicly disclosed, but any instance running code before the unreported fix is vulnerable.

Risk and Exploitability

The CVSS score of 4.8 indicates moderate severity, and the EPSS score of less than 1% signals a low likelihood of widespread exploitation. The vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog and requires local access; thus the risk to remote users is limited. However, local attackers could gain unauthenticated command execution if the affected component is reachable.

Generated by OpenCVE AI on March 17, 2026 at 16:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Identify if your WireMCP installation includes the vulnerable commit.
  • Restrict local access to the Tshark CLI component to trusted administrators.
  • Monitor logs for unexpected command execution or abnormal input patterns.
  • Keep the repository cloned and watch for new commits that address the issue.
  • Apply an official patch or update once released by 0xKoda.
  • As an interim measure, consider disabling or removing the Tshark CLI if it is not needed.

Generated by OpenCVE AI on March 17, 2026 at 16:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 12 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 12 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared 0xkoda
0xkoda wiremcp
Vendors & Products 0xkoda
0xkoda wiremcp

Wed, 11 Mar 2026 22:00:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in 0xKoda WireMCP up to 7f45f8b2b4adeb76be8c6227eefb38533fdd6b1e. Impacted is the function server.tool of the file index.js of the component Tshark CLI Command Handler. The manipulation results in os command injection. The attack needs to be approached locally. The exploit has been made public and could be used. This product utilizes a rolling release system for continuous delivery, and as such, version information for affected or updated releases is not disclosed. The project was informed of the problem early through an issue report but has not responded yet.
Title 0xKoda WireMCP Tshark CLI index.js server.tool os command injection
Weaknesses CWE-77
CWE-78
References
Metrics cvssV2_0

{'score': 4.3, 'vector': 'AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 5.3, 'vector': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 4.8, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-12T19:28:32.193Z

Reserved: 2026-03-11T12:45:31.452Z

Link: CVE-2026-3959

cve-icon Vulnrichment

Updated: 2026-03-12T19:28:26.316Z

cve-icon NVD

Status : Deferred

Published: 2026-03-11T22:16:37.193

Modified: 2026-04-22T21:30:26.497

Link: CVE-2026-3959

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-20T15:36:53Z

Weaknesses