Impact
The registerTools function in src/tools.ts for the new_heim_application component accepts untrusted input and executes it as an OS command, creating an OS command injection flaw that allows an attacker with local access to run arbitrary shell commands. This flaw can compromise the integrity and availability of the affected system, and potentially expose sensitive information if commands are used to read or modify data.
Affected Systems
Nor2-io heim‑mcp, versions up to 0.1.3, including the deploy_heim_application_to_cloud module. The patch identified by commit c321d8af25f77668781e6ccb43a1336f9185df37 resolves the issue. No other vendors or products are listed.
Risk and Exploitability
The CVSS score of 4.8 reflects a medium severity, and the vulnerability is not listed in CISA’s KEV catalog. Exploitation requires local access and is publicly disclosed. With the public exploit available, a local attacker can leverage the flaw until remediation. The lack of EPSS data makes precise predictability unclear, but the existence of a public exploit elevates the urgency to apply the available patch.
OpenCVE Enrichment
Github GHSA