Impact
A command‑line injection flaw exists in the build_project/run_tests function of the PolarVista xcode‑mcp‑server 1.0.0 module. The vulnerability allows an attacker to manipulate the Request argument so that arbitrary OS commands are executed by the server process. This provides the attacker with full control over the affected host, enabling data theft, system compromise, or further lateral movement. The weakness is a classic OS command injection represented by CWE‑77 and CWE‑78.
Affected Systems
The affected product is PolarVista xcode‑mcp‑server 1.0.0. No other versions or vendors are listed. The server component provides a micro‑controller protocol interface and is typically deployed on macOS or Linux machines used in CI/CD or development pipelines.
Risk and Exploitability
The CVSS score of 6.9 categorises the flaw as moderate severity, but the public exploit raises the urgency of remediation. The EPSS score is currently not available, so the actual likelihood of exploitation cannot be quantified, but the availability of a public proof‑of‑concept suggests that attackers could readily target exposed instances. Because the server can be reached remotely and the exploit is straightforward, an adversary with network access can achieve remote code execution without requiring additional credentials. The vulnerability is not listed in the CISA KEV catalog, but the public disclosure implies that it has already been leveraged by malicious actors. As a result, organisations should treat this flaw as critical to operational security.
OpenCVE Enrichment