Impact
A remote attacker can inject arbitrary operating‑system commands by submitting a malicious ID value to the create_rule function of the MCP Interface. The function passes the argument directly to the underlying OS without sanitization, allowing execution of code with the privileges of the service process. Because the API is reachable from outside the host, an attacker can trigger the flaw without local access.
Affected Systems
The vulnerability affects VetCoders mcp-server-semgrep, version 1.0.0. Released fixes are available in version 1.0.1 and later, which incorporate commit 141335da044e53c3f5b315e0386e01238405b771. Any environment running the unpatched component is susceptible.
Risk and Exploitability
The CVSS score of 6.9 indicates a medium severity vulnerability with remote code execution potential. The EPSS score is not available, and the flaw is not listed in CISA KEV, but public exploit code exists, signaling a realistic threat vector. Attackers could exploit the exposed API from the internet or internal network, executing arbitrary commands that may jeopardize system confidentiality, integrity, and availability.
OpenCVE Enrichment