| Title | disler aider-mcp-server 0.1.0 Command Injection |
|---|
| Description | aider-mcp-server exposes an MCP tool named aider_ai_code that accepts attacker-controlled relative_editable_files. After Aider finishes, the server concatenates those file names into a shell command string and executes:
diff_cmd = f"git -C {working_dir} diff -- {files_arg}"
subprocess.check_output(diff_cmd, shell=True, text=True, stderr=subprocess.PIPE)
Because files_arg is built with " ".join(relative_editable_files) and there is no quoting or escaping, a caller can inject shell metacharacters such as ;, #, `, or $(). An untrusted MCP client can therefore execute arbitrary operating-system commands on the host running the server. |
|---|
| Source | ⚠️ https://github.com/disler/aider-mcp-server/issues/16 |
|---|
| User | SmallW (UID 97245) |
|---|
| Submission | 04/10/2026 13:28 (18 days ago) |
|---|
| Moderation | 04/26/2026 22:11 (16 days later) |
|---|
| Status | Accepted |
|---|
| VulDB entry | 359756 [disler aider-mcp-server up to b2516fa466d0d851932da92ee6d0e66946db9efc aider_ai_code server.py relative_editable_files command injection] |
|---|
| Points | 20 |
|---|