Impact
The affected function, installDependencies in src/index.ts, builds shell commands from user provided arguments without proper validation. This flaw allows an attacker with local access to execute arbitrary commands on the host. The vulnerability is classified in the Common Weakness Enumeration as CWE‑74 (Improper Neutralization of Special Elements) and CWE‑77 (Improper Neutralization of Command Injection).
Affected Systems
The package bazinga012:mcp_code_executor is vulnerable in all releases up to and including version 0.3.0. Any installation of the software on a local machine that has not been updated beyond this version remains at risk.
Risk and Exploitability
The CVSS score of 4.8 indicates moderate severity, while the EPSS score of less than 1% suggests a low likelihood of exploitation in the wild. The vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog. Exploitation is possible only from a local environment, but the attack code is available publicly on the project’s GitHub repository, meaning an attacker who gains local foothold could leverage it to elevate privileges or compromise the system.
OpenCVE Enrichment