Impact
A flaw in Braffolk mcp-summarization-functions allows a local attacker to supply a crafted command to the summarize_command routine in src/server/mcp-server.ts, which is executed directly by the operating system. This results in a classic OS command injection, enabling the attacker to run arbitrary commands on the host machine. The vulnerability is present in all releases up to version 0.1.5 and was discovered in the command handling logic of the summarize_command feature. The exploit has been published and is likely usable against unpatched installations.
Affected Systems
Braffolk mcp-summarization-functions versions 0.1.5 and earlier are affected. The issue lies in the src/server/mcp-server.ts file within the summarize_command component. Any system that runs one of these vulnerable versions with local access to the component is at risk of exploitation.
Risk and Exploitability
The CVSS score of 4.8 indicates moderate severity. The EPSS score is not available, but the existence of a public exploit demonstrates that the flaw can be practically leveraged. The attack requires local access, so the threat primarily targets users who can physically or remotely access the host where the component runs. Because the vulnerability is not listed in the CISA KEV catalog, defenders must rely on their own monitoring and mitigation actions. If local access is compromised, an attacker could execute arbitrary system commands, potentially leading to full system compromise.
OpenCVE Enrichment