Description
A vulnerability was determined in AstrBotDevs AstrBot up to 4.22.1. Impacted is the function add_mcp_server of the file astrbot/dashboard/routes/tools.py of the component MCP Endpoint. This manipulation of the argument command causes command injection. The attack is possible to be carried out remotely. The exploit has been publicly disclosed and may be utilized. The project was informed of the problem early through an issue report but has not responded yet.
Published: 2026-04-12
Score: 5.3 Medium
EPSS: 3.7% Low
KEV: No
Impact: Remote Code Execution via Command Injection
Action: Patch ASAP
AI Analysis

Impact

AstrBotDevs AstrBot suffers from a command injection flaw in the add_mcp_server endpoint. By inserting special characters into the command argument, an attacker can execute arbitrary operating‑system commands on the host that runs the service. This flaw is identified as CWE‑74 and CWE‑77, and it can lead to full compromise of confidentiality, integrity, and availability of the compromised machine.

Affected Systems

The vulnerability exists in AstrBot releases up to and including version 4.22.1. The affected component is the MCP Endpoint’s tools.py file, located at astrbot/dashboard/routes/tools.py. Users who maintain any of these versions or earlier ones should be aware that the link used by add_mcp_server is exposed to remote callers, providing a vector for exploitation.

Risk and Exploitability

The CVSS score of 5.3 indicates a moderate impact. The EPSS score is 3% and the vulnerability has not been added to CISA’s KEV catalog. The attack can be carried out remotely, and the exploit has been publicly disclosed, meaning that, until a vendor fix is published, the risk remains until the endpoint is disabled or the system is upgraded.

Generated by OpenCVE AI on April 21, 2026 at 23:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • If the add_mcp_server endpoint is not required, suspend or remove it from the service configuration.
  • Do not accept untrusted input for the command argument; enforce validation or a whitelist of allowed commands.
  • Run the AstrBot process with the least privileges necessary to reduce the impact of a potential injection.
  • Monitor the AstrBot GitHub issue tracker and vendor advisories for a patch release.
  • When a fix becomes available, upgrade the software promptly.

Generated by OpenCVE AI on April 21, 2026 at 23:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 14 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sun, 12 Apr 2026 05:00:00 +0000

Type Values Removed Values Added
Description A vulnerability was determined in AstrBotDevs AstrBot up to 4.22.1. Impacted is the function add_mcp_server of the file astrbot/dashboard/routes/tools.py of the component MCP Endpoint. This manipulation of the argument command causes command injection. The attack is possible to be carried out remotely. The exploit has been publicly disclosed and may be utilized. The project was informed of the problem early through an issue report but has not responded yet.
Title AstrBotDevs AstrBot MCP Endpoint tools.py add_mcp_server command injection
First Time appeared Astrbot
Astrbot astrbot
Weaknesses CWE-74
CWE-77
CPEs cpe:2.3:a:astrbot:astrbot:*:*:*:*:*:*:*:*
Vendors & Products Astrbot
Astrbot astrbot
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-14T13:56:56.956Z

Reserved: 2026-04-11T08:50:21.092Z

Link: CVE-2026-6118

cve-icon Vulnrichment

Updated: 2026-04-14T13:56:52.567Z

cve-icon NVD

Status : Deferred

Published: 2026-04-12T05:16:01.560

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-6118

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T23:30:02Z

Weaknesses