CVE-2025-54073 (GCVE-0-2025-54073)

Vulnerability from cvelistv5 – Published: 2025-07-18 15:45 – Updated: 2025-07-22 18:31
VLAI?
Summary
mcp-package-docs is an MCP (Model Context Protocol) server that provides LLMs with efficient access to package documentation across multiple programming languages and language server protocol (LSP) capabilities. A command injection vulnerability exists in the `mcp-package-docs` MCP Server prior to the fix in commit cb4ad49615275379fd6f2f1cf1ec4731eec56eb9. The vulnerability is caused by the unsanitized use of input parameters within a call to `child_process.exec`, enabling an attacker to inject arbitrary system commands. Successful exploitation can lead to remote code execution under the server process's privileges. The server constructs and executes shell commands using unvalidated user input directly within command-line strings. This introduces the possibility of shell metacharacter injection (`|`, `>`, `&&`, etc.). Commit cb4ad49615275379fd6f2f1cf1ec4731eec56eb9 in version 0.1.27 contains a fix for the issue, but upgrading to 0.1.28 is recommended.
CWE
  • CWE-77 - Improper Neutralization of Special Elements used in a Command ('Command Injection')
Assigner
Impacted products
Vendor Product Version
sammcj mcp-package-docs Affected: < 0.1.27
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-54073",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-07-22T18:31:10.890551Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-07-22T18:31:13.962Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "references": [
          {
            "tags": [
              "exploit"
            ],
            "url": "https://github.com/advisories/GHSA-gjv4-ghm7-q58q"
          },
          {
            "tags": [
              "exploit"
            ],
            "url": "https://github.com/advisories/GHSA-5w57-2ccq-8w95"
          },
          {
            "tags": [
              "exploit"
            ],
            "url": "https://github.com/advisories/GHSA-3q26-f695-pp76"
          },
          {
            "tags": [
              "exploit"
            ],
            "url": "https://github.com/sammcj/mcp-package-docs/security/advisories/GHSA-vf9j-h32g-2764"
          }
        ],
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "mcp-package-docs",
          "vendor": "sammcj",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c 0.1.27"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "mcp-package-docs is an MCP (Model Context Protocol) server that provides LLMs with efficient access to package documentation across multiple programming languages and language server protocol (LSP) capabilities. A command injection vulnerability exists in the `mcp-package-docs` MCP Server prior to the fix in commit cb4ad49615275379fd6f2f1cf1ec4731eec56eb9. The vulnerability is caused by the unsanitized use of input parameters within a call to `child_process.exec`, enabling an attacker to inject arbitrary system commands. Successful exploitation can lead to remote code execution under the server process\u0027s privileges. The server constructs and executes shell commands using unvalidated user input directly within command-line strings. This introduces the possibility of shell metacharacter injection (`|`, `\u003e`, `\u0026\u0026`, etc.). Commit cb4ad49615275379fd6f2f1cf1ec4731eec56eb9 in version 0.1.27 contains a fix for the issue, but upgrading to 0.1.28 is recommended."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-77",
              "description": "CWE-77: Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-07-18T15:45:09.114Z",
        "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
        "shortName": "GitHub_M"
      },
      "references": [
        {
          "name": "https://github.com/sammcj/mcp-package-docs/security/advisories/GHSA-vf9j-h32g-2764",
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/sammcj/mcp-package-docs/security/advisories/GHSA-vf9j-h32g-2764"
        },
        {
          "name": "https://github.com/sammcj/mcp-package-docs/commit/cb4ad49615275379fd6f2f1cf1ec4731eec56eb9",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/sammcj/mcp-package-docs/commit/cb4ad49615275379fd6f2f1cf1ec4731eec56eb9"
        },
        {
          "name": "https://equixly.com/blog/2025/03/29/mcp-server-new-security-nightmare",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://equixly.com/blog/2025/03/29/mcp-server-new-security-nightmare"
        },
        {
          "name": "https://github.com/advisories/GHSA-3q26-f695-pp76",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/advisories/GHSA-3q26-f695-pp76"
        },
        {
          "name": "https://github.com/advisories/GHSA-5w57-2ccq-8w95",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/advisories/GHSA-5w57-2ccq-8w95"
        },
        {
          "name": "https://github.com/advisories/GHSA-gjv4-ghm7-q58q",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/advisories/GHSA-gjv4-ghm7-q58q"
        },
        {
          "name": "https://github.com/sammcj/mcp-package-docs/releases/tag/v0.1.27",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/sammcj/mcp-package-docs/releases/tag/v0.1.27"
        },
        {
          "name": "https://github.com/sammcj/mcp-package-docs/releases/tag/v0.1.28",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/sammcj/mcp-package-docs/releases/tag/v0.1.28"
        },
        {
          "name": "https://invariantlabs.ai/blog/mcp-github-vulnerability",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://invariantlabs.ai/blog/mcp-github-vulnerability"
        }
      ],
      "source": {
        "advisory": "GHSA-vf9j-h32g-2764",
        "discovery": "UNKNOWN"
      },
      "title": "mcp-package-docs vulnerable to command injection in several tools"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
    "assignerShortName": "GitHub_M",
    "cveId": "CVE-2025-54073",
    "datePublished": "2025-07-18T15:45:09.114Z",
    "dateReserved": "2025-07-16T13:22:18.205Z",
    "dateUpdated": "2025-07-22T18:31:13.962Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2025-54073\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2025-07-18T16:15:30.350\",\"lastModified\":\"2025-07-22T19:15:25.863\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"mcp-package-docs is an MCP (Model Context Protocol) server that provides LLMs with efficient access to package documentation across multiple programming languages and language server protocol (LSP) capabilities. A command injection vulnerability exists in the `mcp-package-docs` MCP Server prior to the fix in commit cb4ad49615275379fd6f2f1cf1ec4731eec56eb9. The vulnerability is caused by the unsanitized use of input parameters within a call to `child_process.exec`, enabling an attacker to inject arbitrary system commands. Successful exploitation can lead to remote code execution under the server process\u0027s privileges. The server constructs and executes shell commands using unvalidated user input directly within command-line strings. This introduces the possibility of shell metacharacter injection (`|`, `\u003e`, `\u0026\u0026`, etc.). Commit cb4ad49615275379fd6f2f1cf1ec4731eec56eb9 in version 0.1.27 contains a fix for the issue, but upgrading to 0.1.28 is recommended.\"},{\"lang\":\"es\",\"value\":\"mcp-package-docs es un servidor MCP (Model Context Protocol) que proporciona a los LLM acceso eficiente a la documentaci\u00f3n de paquetes en m\u00faltiples lenguajes de programaci\u00f3n y capacidades de protocolo de servidor de lenguaje (LSP). Existe una vulnerabilidad de inyecci\u00f3n de comandos en el servidor MCP `mcp-package-docs` antes de la correcci\u00f3n en el commit cb4ad49615275379fd6f2f1cf1ec4731eec56eb9. La vulnerabilidad se debe al uso no autorizado de par\u00e1metros de entrada en una llamada a `child_process.exec`, lo que permite a un atacante inyectar comandos arbitrarios del sistema. Una explotaci\u00f3n exitosa puede provocar la ejecuci\u00f3n remota de c\u00f3digo bajo los privilegios del proceso del servidor. El servidor construye y ejecuta comandos de shell utilizando entradas de usuario no validadas directamente dentro de las cadenas de la l\u00ednea de comandos. Esto introduce la posibilidad de inyecci\u00f3n de metacaracteres de shell (`|`, `\u0026gt;`, `\u0026amp;\u0026amp;`, etc.). El commit cb4ad49615275379fd6f2f1cf1ec4731eec56eb9 en la versi\u00f3n 0.1.27 contiene una soluci\u00f3n para el problema, pero se recomienda actualizar a la versi\u00f3n 0.1.28.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.6,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-77\"}]}],\"references\":[{\"url\":\"https://equixly.com/blog/2025/03/29/mcp-server-new-security-nightmare\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/advisories/GHSA-3q26-f695-pp76\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/advisories/GHSA-5w57-2ccq-8w95\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/advisories/GHSA-gjv4-ghm7-q58q\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/sammcj/mcp-package-docs/commit/cb4ad49615275379fd6f2f1cf1ec4731eec56eb9\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/sammcj/mcp-package-docs/releases/tag/v0.1.27\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/sammcj/mcp-package-docs/releases/tag/v0.1.28\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/sammcj/mcp-package-docs/security/advisories/GHSA-vf9j-h32g-2764\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://invariantlabs.ai/blog/mcp-github-vulnerability\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/advisories/GHSA-3q26-f695-pp76\",\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\"},{\"url\":\"https://github.com/advisories/GHSA-5w57-2ccq-8w95\",\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\"},{\"url\":\"https://github.com/advisories/GHSA-gjv4-ghm7-q58q\",\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\"},{\"url\":\"https://github.com/sammcj/mcp-package-docs/security/advisories/GHSA-vf9j-h32g-2764\",\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\"}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-54073\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"poc\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-07-22T18:31:10.890551Z\"}}}], \"references\": [{\"url\": \"https://github.com/advisories/GHSA-gjv4-ghm7-q58q\", \"tags\": [\"exploit\"]}, {\"url\": \"https://github.com/advisories/GHSA-5w57-2ccq-8w95\", \"tags\": [\"exploit\"]}, {\"url\": \"https://github.com/advisories/GHSA-3q26-f695-pp76\", \"tags\": [\"exploit\"]}, {\"url\": \"https://github.com/sammcj/mcp-package-docs/security/advisories/GHSA-vf9j-h32g-2764\", \"tags\": [\"exploit\"]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-07-22T18:31:06.333Z\"}}], \"cna\": {\"title\": \"mcp-package-docs vulnerable to command injection in several tools\", \"source\": {\"advisory\": \"GHSA-vf9j-h32g-2764\", \"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"HIGH\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}}], \"affected\": [{\"vendor\": \"sammcj\", \"product\": \"mcp-package-docs\", \"versions\": [{\"status\": \"affected\", \"version\": \"\u003c 0.1.27\"}]}], \"references\": [{\"url\": \"https://github.com/sammcj/mcp-package-docs/security/advisories/GHSA-vf9j-h32g-2764\", \"name\": \"https://github.com/sammcj/mcp-package-docs/security/advisories/GHSA-vf9j-h32g-2764\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://github.com/sammcj/mcp-package-docs/commit/cb4ad49615275379fd6f2f1cf1ec4731eec56eb9\", \"name\": \"https://github.com/sammcj/mcp-package-docs/commit/cb4ad49615275379fd6f2f1cf1ec4731eec56eb9\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://equixly.com/blog/2025/03/29/mcp-server-new-security-nightmare\", \"name\": \"https://equixly.com/blog/2025/03/29/mcp-server-new-security-nightmare\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://github.com/advisories/GHSA-3q26-f695-pp76\", \"name\": \"https://github.com/advisories/GHSA-3q26-f695-pp76\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://github.com/advisories/GHSA-5w57-2ccq-8w95\", \"name\": \"https://github.com/advisories/GHSA-5w57-2ccq-8w95\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://github.com/advisories/GHSA-gjv4-ghm7-q58q\", \"name\": \"https://github.com/advisories/GHSA-gjv4-ghm7-q58q\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://github.com/sammcj/mcp-package-docs/releases/tag/v0.1.27\", \"name\": \"https://github.com/sammcj/mcp-package-docs/releases/tag/v0.1.27\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://github.com/sammcj/mcp-package-docs/releases/tag/v0.1.28\", \"name\": \"https://github.com/sammcj/mcp-package-docs/releases/tag/v0.1.28\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://invariantlabs.ai/blog/mcp-github-vulnerability\", \"name\": \"https://invariantlabs.ai/blog/mcp-github-vulnerability\", \"tags\": [\"x_refsource_MISC\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"mcp-package-docs is an MCP (Model Context Protocol) server that provides LLMs with efficient access to package documentation across multiple programming languages and language server protocol (LSP) capabilities. A command injection vulnerability exists in the `mcp-package-docs` MCP Server prior to the fix in commit cb4ad49615275379fd6f2f1cf1ec4731eec56eb9. The vulnerability is caused by the unsanitized use of input parameters within a call to `child_process.exec`, enabling an attacker to inject arbitrary system commands. Successful exploitation can lead to remote code execution under the server process\u0027s privileges. The server constructs and executes shell commands using unvalidated user input directly within command-line strings. This introduces the possibility of shell metacharacter injection (`|`, `\u003e`, `\u0026\u0026`, etc.). Commit cb4ad49615275379fd6f2f1cf1ec4731eec56eb9 in version 0.1.27 contains a fix for the issue, but upgrading to 0.1.28 is recommended.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-77\", \"description\": \"CWE-77: Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)\"}]}], \"providerMetadata\": {\"orgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"shortName\": \"GitHub_M\", \"dateUpdated\": \"2025-07-18T15:45:09.114Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2025-54073\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-07-22T18:31:13.962Z\", \"dateReserved\": \"2025-07-16T13:22:18.205Z\", \"assignerOrgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"datePublished\": \"2025-07-18T15:45:09.114Z\", \"assignerShortName\": \"GitHub_M\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…