Impact
The vulnerability involves a command injection flaw in the getGitChanges function of hypermodel‑labs mcp-server-auto-commit. An attacker with local access can supply crafted input that is passed unsanitized to the operating system, allowing arbitrary command execution. This can lead to local privilege escalation or compromise of the system executing the service. The weakness is categorized as CWE‑74 and CWE‑77.
Affected Systems
The issue affects version 1.0.0 of hypermodel‑labs mcp-server-auto-commit. No other versions are publicly identified as vulnerable, but users of this exact release should verify their deployment. The product is provided by hypermodel‑labs under the product name mcp-server-auto-commit.
Risk and Exploitability
The CVSS score for this flaw is 4.8, indicating low‑to‑medium severity, and the EPSS score is less than 1 %, suggesting a low probability of exploitation in the wild. It is not listed in the CISA KEV catalog. The attack can only be performed locally; remote exploitation is not feasible according to the description. The overall risk is considered moderate, but any credentials that have local access to the environment could be abused if the patch is not applied.
OpenCVE Enrichment