제출 #770424: bazinga012 mcp_code_executor <=0.3.0 Command Injection정보

제목bazinga012 mcp_code_executor <=0.3.0 Command Injection
설명A command injection vulnerability exists in mcp_code_executor due to unsafe use of child_process.exec when constructing Python execution and package installation commands with user-controlled input. Successful exploitation allows attackers to execute arbitrary shell commands with the privileges of the MCP server process.
원천⚠️ https://github.com/bazinga012/mcp_code_executor/issues/17
사용자
 Yinci Chen (UID 94659)
제출2026. 03. 03. AM 03:56 (2 개월 ago)
모더레이션2026. 03. 15. AM 09:32 (12 days later)
상태수락
VulDB 항목351111 [bazinga012 mcp_code_executor 까지 0.3.0 src/index.ts installDependencies 권한 상승]
포인트들19

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!