Impact
The flaw resides in the RepoMix Command Handler's getCodebase, getRemoteCodebase, and saveCodebase functions, allowing improper validation of user input to construct operating system commands. This leads to OS command injection, which can enable a local attacker to execute arbitrary commands and potentially gain full control of the affected system. The weakness corresponds to CWE-77 and CWE-78.
Affected Systems
The vulnerability affects the DeDeveloper23 codebase-mcp package. Versions up to commit 3ec749d237dd8eabbeef48657cf917275792fde6 are impacted. The project uses a rolling release model, so precise affected releases are not listed, but any version before the fix will be vulnerable.
Risk and Exploitability
The CVSS score of 4.8 indicates moderate severity, and no EPSS data is available. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires local access to the RepoMix Command Handler; an attacker with such access can trigger the injection. While the attack vector is local, the impact of successful exploitation can be significant, turning a locally authenticated user into a system compromise.
OpenCVE Enrichment