Impact
The vulnerability is a command injection flaw within the executeRepomix function of the RepoMix Command Handler in mcp-code-review-server. Exploitation allows an attacker to supply crafted input that is executed by the host operating system as arbitrary shell commands, potentially compromising confidentiality, integrity, and availability of the affected system. The flaw is formally classified as CWE-74 (Command Injection) and CWE-77 (Improper Validation of Command Contributing Data).
Affected Systems
The issue affects the open‑source project crazyrabbitLTC:mcp-code-review-server, with all releases up to and including version 0.1.0 being vulnerable. No later updates are documented in the provided data, and the project has not yet released a fix.
Risk and Exploitability
The CVSS score of 5.3 indicates a moderate severity baseline. The EPSS score is not available, and the vulnerability is not listed in CISA’s KEV catalog, suggesting no confirmed mass exploitation yet. The likely attack vector is remote, requiring network access to the service that hosts the executeRepomix endpoint. Because the vulnerability permits unconstrained command execution, the potential impact is high if an attacker can reach the affected instance. The lack of an official patch or workaround increases the risk, making mitigation a priority.
OpenCVE Enrichment