Impact
The vulnerability is an OS command injection in the open_image_in_browser function of r‑huijts’ rijksmuseum‑mcp server. By manipulating the imageUrl argument, an attacker can execute arbitrary operating‑system commands on the host, thereby compromising its confidentiality, integrity and availability. The flaw is a classic input‑validation failure (CWE‑77, CWE‑78).
Affected Systems
Any instance of r‑huijts mcp‑server‑rijksmuseum up to and including version 1.0.4 is affected. The vulnerable code resides in the MCP Interface’s image opener located in src/index.ts.
Risk and Exploitability
The CVSS score of 5.3 indicates moderate base severity, yet the flaw is exploitable remotely via the web interface and a public exploit has already been released, signaling real‑world threat potential. EPSS is not available and the vulnerability is not listed in the CISA KEV catalog. The attack is inferred to occur through a crafted imageUrl request sent to the open_image_in_browser endpoint, enabling remote command execution.
OpenCVE Enrichment