Impact
The vulnerability occurs in the child_process.exec call within the gitUtils.ts file. Unvalidated input enables an attacker to execute arbitrary commands on the host, potentially leading to full compromise of the system. This matches known weaknesses CWE-77 and CWE-78.
Affected Systems
The affected product is Sigmade Git-MCP-Server version up to commit 785aa159f262a02d5791a5d8a8e13c507ac42880. Because the project follows a rolling release model, no fixed release is documented and the vulnerability exists in all prior commits until a patch is applied.
Risk and Exploitability
The CVSS score is 4.8 indicating moderate severity, and the vulnerability is not listed in KEV. Since the attack requires local access, the risk is confined to environments where an attacker can run code locally or gain local privileges. Nevertheless, the exploit code has been publicly released, and the vendor did not respond to disclosure, increasing the likelihood of exploitation.
OpenCVE Enrichment