Project Subscriptions
No data.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 30 Apr 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was detected in VetCoders mcp-server-semgrep 1.0.0. This affects the function analyze_results/filter_results/export_results/compare_results/scan_directory/create_rule of the file src/index.ts of the component MCP Interface. The manipulation of the argument ID results in os command injection. The attack can be executed remotely. The exploit is now public and may be used. Upgrading to version 1.0.1 is able to mitigate this issue. The patch is identified as 141335da044e53c3f5b315e0386e01238405b771. It is advisable to upgrade the affected component. | |
| Title | VetCoders mcp-server-semgrep MCP index.ts create_rule os command injection | |
| Weaknesses | CWE-77 CWE-78 |
|
| References |
|
|
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-04-30T00:00:20.595Z
Reserved: 2026-04-29T16:57:29.242Z
Link: CVE-2026-7446
No data.
Status : Received
Published: 2026-04-30T00:16:23.943
Modified: 2026-04-30T00:16:23.943
Link: CVE-2026-7446
No data.
OpenCVE Enrichment
No data.