CVE-2025-10619: OS Command Injection in sequa-ai sequa-mcp
A vulnerability was detected in sequa-ai sequa-mcp up to 1.0.13. This affects the function redirectToAuthorization of the file src/helpers/node-oauth-client-provider.ts of the component OAuth Server Discovery. Performing manipulation results in os command injection. Remote exploitation of the attack is possible. The exploit is now public and may be used. Upgrading to version 1.0.14 is able to mitigate this issue. The patch is named e569815854166db5f71c2e722408f8957fb9e804. It is recommended to upgrade the affected component. The vendor explains: "We only promote that mcp server with our own URLs that have a valid response, but yes if someone would use it with a non sequa url, this is a valid attack vector. We have released a new version (1.0.14) that fixes this and validates that only URLs can be opened."
AI Analysis
Technical Summary
CVE-2025-10619 is a security vulnerability identified in the sequa-ai sequa-mcp product, specifically affecting versions up to 1.0.13. The flaw exists in the redirectToAuthorization function within the src/helpers/node-oauth-client-provider.ts file, which is part of the OAuth Server Discovery component. The vulnerability is an OS command injection, meaning that an attacker can manipulate input parameters to execute arbitrary operating system commands on the affected server. This occurs because the function fails to properly validate or sanitize URLs before using them in a command execution context. The vendor notes that the vulnerability arises if the server is used with non-sequa URLs, which can be exploited remotely without authentication or user interaction. The exploit code has been publicly disclosed, increasing the risk of exploitation. The vendor has released version 1.0.14 to address this issue by enforcing validation to ensure only URLs from sequa domains are accepted, effectively mitigating the injection vector. The CVSS 4.0 base score is 5.3 (medium severity), reflecting network attack vector, low attack complexity, no privileges or user interaction required, but limited impact on confidentiality, integrity, and availability. No known exploits in the wild have been reported yet, but the public availability of the exploit increases the urgency for patching. This vulnerability is critical for environments where sequa-mcp is deployed as it could allow attackers to execute arbitrary commands remotely, potentially leading to system compromise or lateral movement within the network.
Potential Impact
For European organizations using sequa-ai sequa-mcp, this vulnerability poses a significant risk, especially in sectors relying on OAuth-based authentication and authorization services. Successful exploitation could lead to unauthorized command execution on critical infrastructure, potentially compromising sensitive data, disrupting services, or enabling further attacks such as privilege escalation or lateral movement. Given the nature of OAuth servers as gatekeepers for identity and access management, a breach here could undermine trust in authentication processes and lead to broader security incidents. Organizations in finance, healthcare, government, and critical infrastructure sectors are particularly at risk due to the sensitive nature of their data and regulatory requirements under GDPR. The medium severity score suggests moderate impact, but the ease of remote exploitation without authentication elevates the threat level. Additionally, the public availability of exploit code increases the likelihood of opportunistic attacks, making timely patching essential to prevent potential breaches and operational disruptions.
Mitigation Recommendations
European organizations should immediately upgrade sequa-mcp to version 1.0.14 or later, which includes the necessary validation to prevent OS command injection. Beyond patching, organizations should implement strict input validation and sanitization for all URLs and parameters processed by OAuth components. Network segmentation should be employed to isolate authentication servers from less trusted network zones, limiting exposure. Monitoring and logging of OAuth server activities should be enhanced to detect anomalous command execution attempts. Employing application-layer firewalls or runtime application self-protection (RASP) solutions can provide additional defense against injection attacks. Organizations should also review their OAuth configurations to ensure only trusted URLs and domains are permitted, and conduct regular security assessments and penetration testing focused on authentication infrastructure. Finally, incident response plans should be updated to address potential exploitation scenarios involving OAuth server compromise.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain
CVE-2025-10619: OS Command Injection in sequa-ai sequa-mcp
Description
A vulnerability was detected in sequa-ai sequa-mcp up to 1.0.13. This affects the function redirectToAuthorization of the file src/helpers/node-oauth-client-provider.ts of the component OAuth Server Discovery. Performing manipulation results in os command injection. Remote exploitation of the attack is possible. The exploit is now public and may be used. Upgrading to version 1.0.14 is able to mitigate this issue. The patch is named e569815854166db5f71c2e722408f8957fb9e804. It is recommended to upgrade the affected component. The vendor explains: "We only promote that mcp server with our own URLs that have a valid response, but yes if someone would use it with a non sequa url, this is a valid attack vector. We have released a new version (1.0.14) that fixes this and validates that only URLs can be opened."
AI-Powered Analysis
Technical Analysis
CVE-2025-10619 is a security vulnerability identified in the sequa-ai sequa-mcp product, specifically affecting versions up to 1.0.13. The flaw exists in the redirectToAuthorization function within the src/helpers/node-oauth-client-provider.ts file, which is part of the OAuth Server Discovery component. The vulnerability is an OS command injection, meaning that an attacker can manipulate input parameters to execute arbitrary operating system commands on the affected server. This occurs because the function fails to properly validate or sanitize URLs before using them in a command execution context. The vendor notes that the vulnerability arises if the server is used with non-sequa URLs, which can be exploited remotely without authentication or user interaction. The exploit code has been publicly disclosed, increasing the risk of exploitation. The vendor has released version 1.0.14 to address this issue by enforcing validation to ensure only URLs from sequa domains are accepted, effectively mitigating the injection vector. The CVSS 4.0 base score is 5.3 (medium severity), reflecting network attack vector, low attack complexity, no privileges or user interaction required, but limited impact on confidentiality, integrity, and availability. No known exploits in the wild have been reported yet, but the public availability of the exploit increases the urgency for patching. This vulnerability is critical for environments where sequa-mcp is deployed as it could allow attackers to execute arbitrary commands remotely, potentially leading to system compromise or lateral movement within the network.
Potential Impact
For European organizations using sequa-ai sequa-mcp, this vulnerability poses a significant risk, especially in sectors relying on OAuth-based authentication and authorization services. Successful exploitation could lead to unauthorized command execution on critical infrastructure, potentially compromising sensitive data, disrupting services, or enabling further attacks such as privilege escalation or lateral movement. Given the nature of OAuth servers as gatekeepers for identity and access management, a breach here could undermine trust in authentication processes and lead to broader security incidents. Organizations in finance, healthcare, government, and critical infrastructure sectors are particularly at risk due to the sensitive nature of their data and regulatory requirements under GDPR. The medium severity score suggests moderate impact, but the ease of remote exploitation without authentication elevates the threat level. Additionally, the public availability of exploit code increases the likelihood of opportunistic attacks, making timely patching essential to prevent potential breaches and operational disruptions.
Mitigation Recommendations
European organizations should immediately upgrade sequa-mcp to version 1.0.14 or later, which includes the necessary validation to prevent OS command injection. Beyond patching, organizations should implement strict input validation and sanitization for all URLs and parameters processed by OAuth components. Network segmentation should be employed to isolate authentication servers from less trusted network zones, limiting exposure. Monitoring and logging of OAuth server activities should be enhanced to detect anomalous command execution attempts. Employing application-layer firewalls or runtime application self-protection (RASP) solutions can provide additional defense against injection attacks. Organizations should also review their OAuth configurations to ensure only trusted URLs and domains are permitted, and conduct regular security assessments and penetration testing focused on authentication infrastructure. Finally, incident response plans should be updated to address potential exploitation scenarios involving OAuth server compromise.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-17T11:36:32.032Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68cb22688afa0a79ca27307d
Added to database: 9/17/2025, 9:04:40 PM
Last enriched: 9/17/2025, 9:06:27 PM
Last updated: 9/17/2025, 9:06:27 PM
Views: 2
Related Threats
CVE-2025-23316: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in NVIDIA Triton Inference Server
CriticalCVE-2025-10618: SQL Injection in itsourcecode Online Clinic Management System
MediumCVE-2025-8006: CWE-125: Out-of-bounds Read in Ashlar-Vellum Cobalt
HighCVE-2025-8005: CWE-843: Access of Resource Using Incompatible Type ('Type Confusion') in Ashlar-Vellum Cobalt
HighCVE-2025-8004: CWE-125: Out-of-bounds Read in Ashlar-Vellum Cobalt
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.