Impact
The vulnerability exists in the setupToolHandlers function of quip-mcp-server's src/index.ts. It allows an attacker to inject arbitrary operating‑system commands via user input, leading to remote command execution. The weakness is rooted in improper validation of arguments, matching CWE-74 and CWE-77.
Affected Systems
Affected systems are those running AvinashBole:quip-mcp-server 1.0.0. The CVE description does not list additional versions; no other variants are known from the CNA data. Therefore, any deployment of version 1.0.0 exposed to the network is susceptible.
Risk and Exploitability
The CVSS base score is 5.3, indicating moderate severity. EPSS is below 1%, suggesting the exploitation probability is currently low; it is also not present in the CISA KEV catalog. However, the attack can be performed remotely without authentication, so exposed services should be monitored. The exploit has been publicly disclosed and may be used. Without an official patch, the risk remains.
OpenCVE Enrichment