Skip to main content

CVE-2025-9262: OS Command Injection in wong2 mcp-cli

Medium
VulnerabilityCVE-2025-9262cvecve-2025-9262
Published: Wed Aug 20 2025 (08/20/2025, 23:02:07 UTC)
Source: CVE Database V5
Vendor/Project: wong2
Product: mcp-cli

Description

A flaw has been found in wong2 mcp-cli 1.13.0. Affected is the function redirectToAuthorization of the file /src/oauth/provider.js of the component oAuth Handler. This manipulation causes os command injection. The attack may be initiated remotely. The attack is considered to have high complexity. The exploitability is told to be difficult. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 08/20/2025, 23:32:53 UTC

Technical Analysis

CVE-2025-9262 is a security vulnerability identified in version 1.13.0 of the wong2 mcp-cli tool, specifically within the redirectToAuthorization function located in the /src/oauth/provider.js file, which is part of the OAuth Handler component. This vulnerability is an OS command injection flaw, meaning that an attacker can manipulate input to execute arbitrary operating system commands on the affected system. The vulnerability can be exploited remotely without requiring authentication or user interaction, but the attack complexity is high and exploitability is considered difficult. The CVSS 4.0 base score is 6.3 (medium severity), reflecting limited impact on confidentiality, integrity, and availability, and the presence of high attack complexity. The vendor has not responded to the disclosure, and no patches or mitigations have been published yet. Although an exploit has been published, there are no confirmed reports of exploitation in the wild. The vulnerability arises from insufficient input validation or sanitization in the OAuth handler's redirectToAuthorization function, allowing crafted inputs to be interpreted as OS commands, potentially leading to unauthorized command execution on the host system running mcp-cli. This could allow attackers to perform unauthorized actions, escalate privileges, or disrupt services depending on the environment and privileges of the mcp-cli process.

Potential Impact

For European organizations using wong2 mcp-cli version 1.13.0, this vulnerability poses a moderate risk. The ability to execute OS commands remotely could lead to unauthorized access, data leakage, or service disruption. Since mcp-cli is a command-line interface tool likely used in development, deployment, or automation workflows, exploitation could compromise CI/CD pipelines, cloud infrastructure management, or OAuth authorization flows. The medium severity score reflects the difficulty of exploitation and limited scope of impact, but successful exploitation could still lead to significant operational disruptions or data breaches. European organizations relying on this tool in critical infrastructure, financial services, or government sectors could face increased risk, especially if the tool is integrated into sensitive environments. The lack of vendor response and absence of patches increases exposure time, requiring organizations to implement compensating controls. The threat is heightened by the published exploit, which could be leveraged by skilled attackers despite the high complexity.

Mitigation Recommendations

Given the absence of official patches, European organizations should take immediate steps to mitigate risk: 1) Audit and inventory all deployments of wong2 mcp-cli version 1.13.0 to identify affected systems. 2) Restrict network access to systems running mcp-cli to trusted sources only, minimizing exposure to remote attacks. 3) Employ application-layer firewalls or intrusion detection systems to monitor and block suspicious inputs targeting the OAuth handler functions. 4) Where possible, isolate or sandbox the mcp-cli execution environment to limit the impact of potential command injection. 5) Review and harden OAuth authorization configurations to reduce attack surface. 6) Consider temporarily replacing or disabling mcp-cli usage until a vendor patch or official fix is available. 7) Monitor threat intelligence feeds for updates or new exploit techniques related to CVE-2025-9262. 8) Implement strict input validation and sanitization in any custom integrations or wrappers around mcp-cli to prevent injection. 9) Prepare incident response plans to quickly contain and remediate any detected exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-08-20T14:05:46.016Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68a6579cad5a09ad000991c6

Added to database: 8/20/2025, 11:17:48 PM

Last enriched: 8/20/2025, 11:32:53 PM

Last updated: 8/21/2025, 12:54:35 AM

Views: 3

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats