Skip to main content

CVE-2025-10619: OS Command Injection in sequa-ai sequa-mcp

Medium
VulnerabilityCVE-2025-10619cvecve-2025-10619
Published: Wed Sep 17 2025 (09/17/2025, 21:02:11 UTC)
Source: CVE Database V5
Vendor/Project: sequa-ai
Product: sequa-mcp

Description

A vulnerability was detected in sequa-ai sequa-mcp up to 1.0.13. This affects the function redirectToAuthorization of the file src/helpers/node-oauth-client-provider.ts of the component OAuth Server Discovery. Performing manipulation results in os command injection. Remote exploitation of the attack is possible. The exploit is now public and may be used. Upgrading to version 1.0.14 is able to mitigate this issue. The patch is named e569815854166db5f71c2e722408f8957fb9e804. It is recommended to upgrade the affected component. The vendor explains: "We only promote that mcp server with our own URLs that have a valid response, but yes if someone would use it with a non sequa url, this is a valid attack vector. We have released a new version (1.0.14) that fixes this and validates that only URLs can be opened."

AI-Powered Analysis

AILast updated: 09/17/2025, 21:06:27 UTC

Technical Analysis

CVE-2025-10619 is a security vulnerability identified in the sequa-ai sequa-mcp product, specifically affecting versions up to 1.0.13. The flaw exists in the redirectToAuthorization function within the src/helpers/node-oauth-client-provider.ts file, which is part of the OAuth Server Discovery component. The vulnerability is an OS command injection, meaning that an attacker can manipulate input parameters to execute arbitrary operating system commands on the affected server. This occurs because the function fails to properly validate or sanitize URLs before using them in a command execution context. The vendor notes that the vulnerability arises if the server is used with non-sequa URLs, which can be exploited remotely without authentication or user interaction. The exploit code has been publicly disclosed, increasing the risk of exploitation. The vendor has released version 1.0.14 to address this issue by enforcing validation to ensure only URLs from sequa domains are accepted, effectively mitigating the injection vector. The CVSS 4.0 base score is 5.3 (medium severity), reflecting network attack vector, low attack complexity, no privileges or user interaction required, but limited impact on confidentiality, integrity, and availability. No known exploits in the wild have been reported yet, but the public availability of the exploit increases the urgency for patching. This vulnerability is critical for environments where sequa-mcp is deployed as it could allow attackers to execute arbitrary commands remotely, potentially leading to system compromise or lateral movement within the network.

Potential Impact

For European organizations using sequa-ai sequa-mcp, this vulnerability poses a significant risk, especially in sectors relying on OAuth-based authentication and authorization services. Successful exploitation could lead to unauthorized command execution on critical infrastructure, potentially compromising sensitive data, disrupting services, or enabling further attacks such as privilege escalation or lateral movement. Given the nature of OAuth servers as gatekeepers for identity and access management, a breach here could undermine trust in authentication processes and lead to broader security incidents. Organizations in finance, healthcare, government, and critical infrastructure sectors are particularly at risk due to the sensitive nature of their data and regulatory requirements under GDPR. The medium severity score suggests moderate impact, but the ease of remote exploitation without authentication elevates the threat level. Additionally, the public availability of exploit code increases the likelihood of opportunistic attacks, making timely patching essential to prevent potential breaches and operational disruptions.

Mitigation Recommendations

European organizations should immediately upgrade sequa-mcp to version 1.0.14 or later, which includes the necessary validation to prevent OS command injection. Beyond patching, organizations should implement strict input validation and sanitization for all URLs and parameters processed by OAuth components. Network segmentation should be employed to isolate authentication servers from less trusted network zones, limiting exposure. Monitoring and logging of OAuth server activities should be enhanced to detect anomalous command execution attempts. Employing application-layer firewalls or runtime application self-protection (RASP) solutions can provide additional defense against injection attacks. Organizations should also review their OAuth configurations to ensure only trusted URLs and domains are permitted, and conduct regular security assessments and penetration testing focused on authentication infrastructure. Finally, incident response plans should be updated to address potential exploitation scenarios involving OAuth server compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-17T11:36:32.032Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68cb22688afa0a79ca27307d

Added to database: 9/17/2025, 9:04:40 PM

Last enriched: 9/17/2025, 9:06:27 PM

Last updated: 9/17/2025, 9:06:27 PM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats