Submit #620530: agno-agi agno v1.7.5 OS Command Injectioninfo

Titleagno-agi agno v1.7.5 OS Command Injection
DescriptionA critical Remote Code Execution (RCE) vulnerability exists in the Agno framework's MCP (Model Context Protocol) integration. The vulnerability allows arbitrary command execution through insufficient input validation in the `MCPTools` and `MultiMCPTools` classes. When user-controlled input is passed to the `command` parameter, it is directly processed by `shlex.split()` and passed to `StdioServerParameters` without any sanitization or validation, enabling attackers to execute arbitrary system commands with the privileges of the Agno agent process.
Source⚠️ https://github.com/bayuncao-bit/vul-30
User
 bayuncao (UID 50143)
Submission07/22/2025 05:42 (9 months ago)
Moderation08/06/2025 10:28 (15 days later)
StatusAccepted
VulDB entry319025 [agno-agi agno up to 1.7.5 Model Context Protocol mcp.py MCPTools/MultiMCPTools command os command injection]
Points20

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!