Impact
A flaw in MoussaabBadla’s code-screenshot-mcp HTTP interface allows an attacker to inject operating‑system commands via crafted requests, giving the attacker the ability to run arbitrary commands on the host. This results in a compromise of confidentiality, integrity, and availability, as the attacker can execute any shell command with the privileges of the running service.
Affected Systems
The vulnerability affects all releases of MoussaabBadla code-screenshot-mcp up to and including version 0.1.0. The precise component within the HTTP interface that is impacted is not specified, but any instance of the application exposed to untrusted traffic is potentially vulnerable.
Risk and Exploitability
The CVSS score of 5.3 indicates a medium severity, but the public disclosure of an exploit and the lack of a vendor response increase the risk. The EPSS score is unavailable, and the vulnerability is not listed in the CISA KEV catalog. Attackers can reach the vulnerable interface remotely via HTTP, making the vector network‑based. Without a patch, the risk remains high, and the attack remains feasible as demonstrated by publicly available proof‑of‑concept code.
OpenCVE Enrichment