Impact
An OS command injection flaw exists in ChrisChinchilla Vale‑MCP’s HTTP interface, where manipulating the config_path argument in src/index.ts allows an attacker to execute arbitrary operating‑system commands with the privileges of the running application. This can compromise system integrity and availability by enabling the execution of any command the process user is permitted to run.
Affected Systems
The vulnerability affects versions of ChrisChinchilla Vale‑MCP up to 0.1.0. Only this specific component’s HTTP interface exposes the vulnerable config_path argument; no other versions or vendors are known to be impacted.
Risk and Exploitability
The CVSS score of 4.8 indicates a moderate severity, and the requirement for local access limits the threat to environments where an attacker can reach the target application locally or where the component accepts input from untrusted users. No exploit probability score is available and the vulnerability is not listed in CISA’s KEV catalog. Because the vendor has not released a remediation, the risk persists until a patch is provided or the exposure is mitigated.
OpenCVE Enrichment