Impact
The vulnerability exists within an unidentified function in branch_monkey_mcp/bridge_and_local_actions/routes/advanced.py. By manipulating the dev_script argument, an attacker can inject arbitrary shell commands. Successful exploitation results in remote command execution with the same privileges as the web application process, potentially allowing data exfiltration, tampering, or further system compromise. The flaw is reported for commits up to 69bc71874ce40050ef45fde5a435855f18af3373, and no mitigation has been publicly released.
Affected Systems
The affected product is eyal‑gor's p_69_branch_monkey_mcp project distributed on GitHub. Because the repository does not use formal versioning, all revisions prior to the patched commit are considered vulnerable. No specific release numbers are documented, so any publicly deployed copy of the code up to the mentioned commit is at risk.
Risk and Exploitability
The CVSS score of 6.9 indicates moderate severity. The EPSS score is 1%, but the exploit is publicly reachable and may already be in use, making the threat tangible. Attackers only need to supply a crafted dev_script value via an HTTP request to gain code execution.
OpenCVE Enrichment