Description
A vulnerability was detected in raine consult-llm-mcp up to 2.5.3. Affected by this vulnerability is the function child_process.execSync of the file src/server.ts. The manipulation of the argument git_diff.base_ref/git_diff.files results in os command injection. The attack is only possible with local access. The exploit is now public and may be used. Upgrading to version 2.5.4 addresses this issue. The patch is identified as 4abf297b34e5e8a9cb364b35f52c5f0ca1d599d3. Upgrading the affected component is recommended.
Published: 2026-03-30
Score: 4.8 Medium
EPSS: n/a
KEV: No
Impact: OS Command Injection via server child_process.execSync enabling arbitrary local command execution
Action: Patch
AI Analysis

Impact

The vulnerability lies in the child_process.execSync call within src/server.ts where unvalidated git_diff.base_ref and git_diff.files values are passed to an operating system shell. This flaw permits OS command injection, which can lead to execution of arbitrary commands on the host system. The weakness is a classic command injection issue classified under CWE-77 and CWE-78. The impact is limited to local actors who can interact with the server, allowing them to run potentially destructive commands and compromise local confidentiality, integrity, or availability. The affected function is exposed in raine consult-llm-mcp up to version 2.5.3.

Affected Systems

The issue affects the raine consult-llm-mcp product, specifically any deployment running a version prior to 2.5.4. Upgrading to release 2.5.4 or later incorporates the fix identified by commit 4abf297b34e5e8a9cb364b35f52c5f0ca1d599d3. Users running older releases should identify whether their systems include the vulnerable server.ts implementation and then apply the upgrade.

Risk and Exploitability

With a CVSS score of 4.8 the vulnerability is considered moderate; it requires local access, and the exploit is publicly available. Although the EPSS score and KEV status are not listed, the public nature of the exploit and the fact that it can be triggered with any local user privilege level elevate the risk for environments where the application runs with elevated permissions. Mitigation through patching remains the most effective countermeasure.

Generated by OpenCVE AI on March 30, 2026 at 18:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade raine consult-llm-mcp to version 2.5.4 or later, which includes the commit 4abf297b34e5e8a9cb364b35f52c5f0ca1d599d3 that removes the unvalidated command execution.
  • Verify that the application no longer uses child_process.execSync with unsanitized inputs in the server.ts code; if a custom deployment is in use, apply the same sanitization or remove the vulnerable call.

Generated by OpenCVE AI on March 30, 2026 at 18:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 30 Mar 2026 17:30:00 +0000

Type Values Removed Values Added
Description A vulnerability was detected in raine consult-llm-mcp up to 2.5.3. Affected by this vulnerability is the function child_process.execSync of the file src/server.ts. The manipulation of the argument git_diff.base_ref/git_diff.files results in os command injection. The attack is only possible with local access. The exploit is now public and may be used. Upgrading to version 2.5.4 addresses this issue. The patch is identified as 4abf297b34e5e8a9cb364b35f52c5f0ca1d599d3. Upgrading the affected component is recommended.
Title raine consult-llm-mcp server.ts child_process.execSync os command injection
Weaknesses CWE-77
CWE-78
References
Metrics cvssV2_0

{'score': 4.3, 'vector': 'AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C'}

cvssV3_0

{'score': 5.3, 'vector': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C'}

cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C'}

cvssV4_0

{'score': 4.8, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-30T17:00:13.107Z

Reserved: 2026-03-30T07:55:02.890Z

Link: CVE-2026-5125

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-03-30T18:16:20.220

Modified: 2026-03-30T18:16:20.220

Link: CVE-2026-5125

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-30T20:55:27Z

Weaknesses