mcp is vulnerable to Command Injection
55
Medium Risk
Affected versions of this package are vulnerable to command injection in example code that opens URLs using system shell execution. The affected logic constructs a shell command using a user-influenced URL and executes it without proper sanitization or argument separation, allowing crafted input containing shell metacharacters to modify the executed command. An attacker able to control the URL value can inject arbitrary commands, leading to unintended command execution in environments where the example code is reused or adapted in real applications.
You are affected if you are using the example code from a version that falls within the vulnerable range.
mcp is vulnerable to Command Injection in versions 1.23.0 - 1.26.0.
Check if you are using the vulnerable example code and upgrade to the patch version.
Secure your code, cloud, and runtime environments in one central system. Find and fix vulnerabilities automatically.
No credit card required | Scan results in 32secs.
SOC 2Compliant
ISO 27001Compliant