Impact
This vulnerability in ArtMin96 yii2-mcp-server 1.0.2 allows an attacker to inject operating system commands via the yii_execute_command endpoint in src/index.ts, resulting in remote command execution. The flaw arises from insufficient input validation and is identified as CWE-77 and CWE-78, enabling an attacker to run arbitrary system commands with the privileges of the web process.
Affected Systems
Affected is the ArtMin96 yii2-mcp-server component, version 1.0.2. No other versions are explicitly listed, but the flaw is localized to the yii_command_help/yii_execute_command function in this release.
Risk and Exploitability
The CVSS score is 5.3, indicating a medium severity. EPSS is not available, which does not confirm current exploitation probability but the presence of a published exploit suggests it could be exploited. The vulnerability is not listed in the CISA KEV catalog. An attacker can reach the target remotely, sending crafted input to the MCP interface to trigger command execution.
OpenCVE Enrichment