Description
A vulnerability was found in 54yyyu code-mcp up to 4cfc4643541a110c906d93635b391bf7e357f4a8. The impacted element is the function git_operation of the file src/code_mcp/server.py of the component MCP Tool. Performing a manipulation of the argument operation results in command injection. The attack can be initiated remotely. The exploit has been made public and could be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The project was informed of the problem early through an issue report but has not responded yet.
Published: 2026-05-05
Score: 6.9 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The MCP Tool contains a command injection flaw in the git_operation function of server.py. By manipulating the "operation" argument that is passed to the function, an attacker who can reach the exposed endpoint can cause the underlying shell to execute arbitrary commands. The defect is classified as CWE‑74 and CWE‑77 because user control data is incorporated into a shell command without adequate validation or sanitisation.

Affected Systems

All releases of 54yyyu code‑mcp that include the git_operation code up to the commit 4cfc4643541a110c906d93635b391bf7e357f4a8 are vulnerable. No later commit has been confirmed to contain a fix, and the project maintainer has yet to respond to the issue report. Continuous delivery with rolling releases is used, so vulnerability status will not change until a patch is released.

Risk and Exploitability

The CVSS score of 6.9 indicates a moderate risk. The EPSS score is not available, and the vulnerability is not listed in the CISA KEV catalogue. Attacks can be launched remotely through the git_operation endpoint, and the exploit has already been published publicly. Because no patch is available, the risk remains significant until the maintainer addresses the issue. Network exposure of the service increases the likelihood that an attacker will discover a usable target.

Generated by OpenCVE AI on May 5, 2026 at 07:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the vendor’s patch or upgrade to a version that contains the fix once it becomes available, verifying the commit hash against the fix commit.
  • Limit access to the MCP Tool by restricting the network exposure of the git_operation service to trusted hosts, using firewall rules or network segmentation to reduce the attack surface.
  • As a temporary countermeasure, add input validation or sanitisation to the operation parameter, or refactor the code to avoid using dynamic shell commands when executing subprocess calls.

Generated by OpenCVE AI on May 5, 2026 at 07:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 05 May 2026 05:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in 54yyyu code-mcp up to 4cfc4643541a110c906d93635b391bf7e357f4a8. The impacted element is the function git_operation of the file src/code_mcp/server.py of the component MCP Tool. Performing a manipulation of the argument operation results in command injection. The attack can be initiated remotely. The exploit has been made public and could be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The project was informed of the problem early through an issue report but has not responded yet.
Title 54yyyu code-mcp MCP Tool server.py git_operation command injection
Weaknesses CWE-74
CWE-77
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-05-05T04:15:12.122Z

Reserved: 2026-05-04T21:25:51.261Z

Link: CVE-2026-7812

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-05T05:16:00.720

Modified: 2026-05-05T05:16:00.720

Link: CVE-2026-7812

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-05T07:30:19Z

Weaknesses