Submit #802061: disler aider-mcp-server 0.1.0 Command Injectioninfo

Titledisler aider-mcp-server 0.1.0 Command Injection
Descriptionaider-mcp-server exposes an MCP tool named aider_ai_code that accepts attacker-controlled relative_editable_files. After Aider finishes, the server concatenates those file names into a shell command string and executes: diff_cmd = f"git -C {working_dir} diff -- {files_arg}" subprocess.check_output(diff_cmd, shell=True, text=True, stderr=subprocess.PIPE) Because files_arg is built with " ".join(relative_editable_files) and there is no quoting or escaping, a caller can inject shell metacharacters such as ;, #, `, or $(). An untrusted MCP client can therefore execute arbitrary operating-system commands on the host running the server.
Source⚠️ https://github.com/disler/aider-mcp-server/issues/16
User SmallW (UID 97245)
Submission04/10/2026 13:28 (18 days ago)
Moderation04/26/2026 22:11 (16 days later)
StatusAccepted
VulDB entry359756 [disler aider-mcp-server up to b2516fa466d0d851932da92ee6d0e66946db9efc aider_ai_code server.py relative_editable_files command injection]
Points20

Do you know our Splunk app?

Download it now for free!