Impact
A flaw in the execute method of base_mcp_node.py within 1Panel‑dev MaxKB allows an attacker to supply crafted input that triggers the execution of arbitrary operating‑system commands. This vulnerability enables remote code execution, granting the attacker the ability to compromise the confidentiality, integrity, and availability of the affected host system. The weakness is a command injection (CWE‑77 and CWE‑78).
Affected Systems
The affected software is 1Panel‑dev MaxKB, versions up to and including 2.6.1. The vulnerability exists in the Model Context Protocol Node component of the application and affects no other vendors or versions reported.
Risk and Exploitability
The reported severity rating is moderate, corresponding to a score of 5.3, indicating moderate risk. Exploit probability data is not available. The vulnerability has not been cataloged by CISA's Known Exploited Vulnerabilities program. Information suggests the flaw can be triggered remotely, inferred from the description that manipulation can occur over a network. Successful exploitation requires network access to the vulnerable endpoint and sufficient privileges to execute system commands.
OpenCVE Enrichment