Description
A security vulnerability has been detected in Sunwood-ai-labs command-executor-mcp-server up to 0.1.0. This impacts the function execute_command of the file src/index.ts of the component MCP Interface. The manipulation leads to os command injection. Remote exploitation of the attack is possible. The exploit has been disclosed publicly and may be used. The project was informed of the problem early through an issue report but has not responded yet.
Published: 2026-05-01
Score: 6.9 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A flaw in the execute_command function of Sunwood‑ai‑labs command‑executor‑mcp‑server allows an attacker to supply arbitrary shell commands that are executed on the underlying operating system. The vulnerability is a classic OS command injection (CWE‑77 and CWE‑78) and provides remote attackers the ability to run any command with the privileges of the service. The impact includes data theft, modification and complete compromise of the host where the MCP server is running.

Affected Systems

The affected product is Sunwood‑ai‑labs command‑executor‑mcp‑server version 0.1.0 and all earlier versions. No other vendors or product versions are listed.

Risk and Exploitability

The CVSS score of 6.9 indicates a medium severity with potential for high impact if exploited. The EPSS score is currently unavailable, and the vulnerability is not listed in the CISA KEV catalog, suggesting no confirmed exploits yet. However, the disclosure is public and the server opens a remote interface, which is the inferred attack vector. Any exposed instance remains at high risk until mitigated.

Generated by OpenCVE AI on May 1, 2026 at 22:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update to a patched version of command‑executor‑mcp‑server as soon as it is available. If the project has not released a fix yet, do not run the vulnerable version in a production environment.
  • Limit network exposure by placing the MCP server behind a firewall or VPN and restricting inbound traffic to trusted hosts only. This reduces the likelihood of remote exploitation.
  • Add input validation to the execute_command endpoint: accept only a whitelist of permitted commands or use parameterized execution functions that do not invoke a shell. If modification of source code is not possible, consider running the service with the least privileges required and inside a sandbox or container to contain potential damage.

Generated by OpenCVE AI on May 1, 2026 at 22:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 01 May 2026 20:30:00 +0000

Type Values Removed Values Added
Description A security vulnerability has been detected in Sunwood-ai-labs command-executor-mcp-server up to 0.1.0. This impacts the function execute_command of the file src/index.ts of the component MCP Interface. The manipulation leads to os command injection. Remote exploitation of the attack is possible. The exploit has been disclosed publicly and may be used. The project was informed of the problem early through an issue report but has not responded yet.
Title Sunwood-ai-labs command-executor-mcp-server MCP index.ts execute_command os command injection
Weaknesses CWE-77
CWE-78
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-05-01T20:15:14.494Z

Reserved: 2026-05-01T09:43:49.145Z

Link: CVE-2026-7593

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-01T21:16:17.787

Modified: 2026-05-01T21:16:17.787

Link: CVE-2026-7593

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-01T23:00:14Z

Weaknesses