Impact
The flaw resides in the StdioClientTransport function of chatboxai chatbox up to version 1.20.0. An attacker who can influence the args or env parameters can inject operating‑system commands, leading to arbitrary code execution on the host running the chatbox server. The weakness is a classic OS command injection identified by CWE‑77 and CWE‑78, allowing the attacker to run any command with the privileges of the process and thereby jeopardize confidentiality, integrity, and availability.
Affected Systems
Affected systems are installations of chatboxai chatbox that utilize the Model Context Protocol Server Management System built on StdioClientTransport. The vulnerability applies to all releases up to and including version 1.20.0; newer releases are not affected.
Risk and Exploitability
The CVSS score of 6.9 indicates moderate severity, and the exploit has been published for use. The attack can be launched remotely when the chatbox service is reachable over the network. EPSS data is not available, and the issue is not listed in CISA’s KEV catalog, but the public availability of the exploit and the lack of an immediate fix make the risk significant. Once a target is exposed, an attacker can execute arbitrary commands, potentially enabling pivoting or further compromise.
OpenCVE Enrichment