Impact
privsim mcp-test-runner 0.2.0 contains a flaw in the child_process.spawn call within src/index.ts that allows attackers to craft the command argument and achieve OS command injection. The vulnerability is a classic command injection (CWE‑77) with the potential to be exploited entirely remotely, enabling the execution of arbitrary shell commands on the host system. The impact includes full compromise of confidentiality, integrity, and availability of the affected host.
Affected Systems
The affected product is privsim's mcp-test-runner, version 0.2.0. No other versions or vendors are listed as impacted by the CVE.
Risk and Exploitability
The CVSS score of 5.3 indicates a moderate severity, while the EPSS score is not available and the vulnerability is not listed in the CISA KEV catalog. The public availability of an exploit and the ability to launch the attack remotely raise the risk level. Attackers could gain control of the system if the host is exposed, especially if the mcp-test-runner service is reachable from untrusted networks.
OpenCVE Enrichment