Description
A vulnerability was found in 1Panel-dev MaxKB up to 2.6.1. The affected element is the function execute of the file apps/application/flow/step_node/mcp_node/impl/base_mcp_node.py of the component Model Context Protocol Node. Performing a manipulation results in os command injection. The attack is possible to be carried out remotely. The exploit has been made public and could be used. You should upgrade the affected component. The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product.
Published: 2026-04-12
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote OS Command Execution
Action: Patch Now
AI Analysis

Impact

A flaw in the execute method of base_mcp_node.py within 1Panel‑dev MaxKB allows an attacker to supply crafted input that triggers the execution of arbitrary operating‑system commands. This vulnerability enables remote code execution, granting the attacker the ability to compromise the confidentiality, integrity, and availability of the affected host system. The weakness is a command injection (CWE‑77 and CWE‑78).

Affected Systems

The affected software is 1Panel‑dev MaxKB, versions up to and including 2.6.1. The vulnerability exists in the Model Context Protocol Node component of the application and affects no other vendors or versions reported.

Risk and Exploitability

The reported severity rating is moderate, corresponding to a score of 5.3, indicating moderate risk. Exploit probability data is not available. The vulnerability has not been cataloged by CISA's Known Exploited Vulnerabilities program. Information suggests the flaw can be triggered remotely, inferred from the description that manipulation can occur over a network. Successful exploitation requires network access to the vulnerable endpoint and sufficient privileges to execute system commands.

Generated by OpenCVE AI on April 12, 2026 at 03:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the vendor‑released patch to upgrade MaxKB to version 2.6.2 or later.
  • If immediate upgrade is not possible, isolate the vulnerable component from untrusted external traffic and restrict access to trusted networks.
  • Enable audit logging and monitor for unexpected command execution or anomalous processes to detect possible exploitation.

Generated by OpenCVE AI on April 12, 2026 at 03:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 14 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 13 Apr 2026 13:00:00 +0000

Type Values Removed Values Added
First Time appeared 1panel
1panel maxkb
Vendors & Products 1panel
1panel maxkb

Sun, 12 Apr 2026 01:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in 1Panel-dev MaxKB up to 2.6.1. The affected element is the function execute of the file apps/application/flow/step_node/mcp_node/impl/base_mcp_node.py of the component Model Context Protocol Node. Performing a manipulation results in os command injection. The attack is possible to be carried out remotely. The exploit has been made public and could be used. You should upgrade the affected component. The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product.
Title 1Panel-dev MaxKB Model Context Protocol Node base_mcp_node.py execute os command injection
First Time appeared Maxkb
Maxkb maxkb
Weaknesses CWE-77
CWE-78
CPEs cpe:2.3:a:maxkb:maxkb:*:*:*:*:*:*:*:*
Vendors & Products Maxkb
Maxkb maxkb
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-14T14:00:16.365Z

Reserved: 2026-04-11T07:35:04.182Z

Link: CVE-2026-6108

cve-icon Vulnrichment

Updated: 2026-04-14T14:00:12.824Z

cve-icon NVD

Status : Deferred

Published: 2026-04-12T01:16:16.807

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-6108

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-13T12:56:28Z

Weaknesses