Description
A vulnerability was identified in idachev mcp-javadc up to 1.2.4. Impacted is an unknown function of the component HTTP Interface. Such manipulation of the argument jarFilePath leads to os command injection. It is possible to launch the attack remotely. The exploit is publicly available and might be used. The project was informed of the problem early through an issue report but has not responded yet.
Published: 2026-04-08
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote OS Command Injection
Action: Immediate Patch
AI Analysis

Impact

An HTTP interface in idachev mcp-javadc accepts a jarFilePath argument that is passed directly to the operating system’s command line, creating a classic OS command injection flaw identified by CWE-77. The vulnerability also falls under the broader Command Injection category (CWE-78), allowing an attacker to inject arbitrary shell commands. Successful exploitation grants the attacker the ability to execute any command on the host, potentially leading to full system compromise, data theft, or denial of service.

Affected Systems

The flaw exists in idachev mcp-javadc releases up to version 1.2.4. It is triggered through a web‑based HTTP endpoint that is exposed to network traffic, meaning any deployment of the affected application, regardless of underlying operating system, is susceptible.

Risk and Exploitability

With a CVSS score of 6.9 the vulnerability signals moderate severity, but the publicly available proof‑of‑concept means an attack can be launched remotely by sending crafted requests. The lack of an EPSS score and absence from the CISA KEV catalog do not reduce the risk; the operator still faces the possibility of local or remote compromise without requiring authenticated access or privileged rights. The architecture allows direct command execution, making the threat highly actionable for a motivated attacker.

Generated by OpenCVE AI on April 8, 2026 at 21:52 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check the author’s repository or official vendor site for a patched release and upgrade to a fixed version as soon as one is available.
  • Limit exposure of the HTTP interface to trusted networks only, using firewall rules, IP whitelisting, or VPN tunnel requirements.
  • Instrument the service to log incoming jarFilePath values and investigate any suspicious characters or command separators such as “;”, “&&”, or “|”.
  • If code changes are possible, insert server‑side validation or sanitization to reject or escape any shell metacharacters before the jarFilePath value is utilized.

Generated by OpenCVE AI on April 8, 2026 at 21:52 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 09 Apr 2026 08:30:00 +0000

Type Values Removed Values Added
First Time appeared Idachev
Idachev mcp-javadc
Vendors & Products Idachev
Idachev mcp-javadc

Wed, 08 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was identified in idachev mcp-javadc up to 1.2.4. Impacted is an unknown function of the component HTTP Interface. Such manipulation of the argument jarFilePath leads to os command injection. It is possible to launch the attack remotely. The exploit is publicly available and might be used. The project was informed of the problem early through an issue report but has not responded yet.
Title idachev mcp-javadc HTTP os command injection
Weaknesses CWE-77
CWE-78
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Idachev Mcp-javadc
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-08T20:00:24.876Z

Reserved: 2026-04-08T14:29:32.763Z

Link: CVE-2026-5802

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-08T20:16:27.340

Modified: 2026-04-08T21:26:13.410

Link: CVE-2026-5802

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-09T08:27:30Z

Weaknesses