CVE-2026-4199: Command Injection in bazinga012 mcp_code_executor
A vulnerability was identified in bazinga012 mcp_code_executor up to 0.3.0. Affected by this issue is the function installDependencies of the file src/index.ts. Such manipulation leads to command injection. The attack can only be performed from a local environment. The exploit is publicly available and might be used. It is best practice to apply a patch to resolve this issue. The project was informed of the problem early through an issue report but has not responded yet.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2026-4199 affects the bazinga012 mcp_code_executor software up to version 0.3.0. It resides specifically in the installDependencies function of the src/index.ts file, where improper input handling leads to command injection. This flaw allows an attacker with local access and low privileges to inject and execute arbitrary system commands, potentially compromising the host system. The attack vector is local, meaning remote exploitation is not feasible without prior access. The CVSS 4.0 vector indicates low attack complexity and no user interaction is required, but privileges are needed. The vulnerability impacts confidentiality, integrity, and availability by enabling unauthorized command execution. Although the exploit code is publicly available, no active exploitation in the wild has been reported. The vendor was notified early but has not issued a patch or response. This leaves users exposed until mitigations or updates are applied. The vulnerability is classified as medium severity due to the local access requirement and limited scope but remains a significant risk in environments where local access can be obtained by attackers or malicious insiders.
Potential Impact
This vulnerability can lead to unauthorized command execution on systems running vulnerable versions of mcp_code_executor, potentially allowing attackers to escalate privileges, manipulate or exfiltrate sensitive data, disrupt services, or install persistent malware. Since exploitation requires local access, the threat is particularly relevant in multi-user environments, development machines, or compromised internal networks. Organizations relying on this software for code execution or dependency management could face integrity and availability issues if attackers leverage this flaw. The lack of vendor response and patch increases the risk exposure period. While remote exploitation is not possible directly, attackers who gain local foothold through other means could use this vulnerability to deepen their control, making it a valuable post-compromise tool. The medium severity rating reflects the balance between the attack complexity and potential damage, but the impact can be severe in targeted environments.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately restrict local access to systems running mcp_code_executor to trusted users only. Implement strict access controls and monitor for unusual local activity. Since no official patch is available, consider applying manual code reviews and sanitizing inputs in the installDependencies function to prevent command injection. Employ application whitelisting and endpoint detection solutions to detect anomalous command executions. Isolate environments running this software to limit lateral movement. Regularly audit logs for suspicious local command executions. If feasible, replace or avoid using vulnerable versions until a vendor patch is released. Engage with the vendor or community to encourage timely patch development. Additionally, educate developers and administrators about the risks of local command injection and enforce secure coding practices to prevent similar issues.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Netherlands, Japan, South Korea, India
CVE-2026-4199: Command Injection in bazinga012 mcp_code_executor
Description
A vulnerability was identified in bazinga012 mcp_code_executor up to 0.3.0. Affected by this issue is the function installDependencies of the file src/index.ts. Such manipulation leads to command injection. The attack can only be performed from a local environment. The exploit is publicly available and might be used. It is best practice to apply a patch to resolve this issue. The project was informed of the problem early through an issue report but has not responded yet.
AI-Powered Analysis
Technical Analysis
The vulnerability identified as CVE-2026-4199 affects the bazinga012 mcp_code_executor software up to version 0.3.0. It resides specifically in the installDependencies function of the src/index.ts file, where improper input handling leads to command injection. This flaw allows an attacker with local access and low privileges to inject and execute arbitrary system commands, potentially compromising the host system. The attack vector is local, meaning remote exploitation is not feasible without prior access. The CVSS 4.0 vector indicates low attack complexity and no user interaction is required, but privileges are needed. The vulnerability impacts confidentiality, integrity, and availability by enabling unauthorized command execution. Although the exploit code is publicly available, no active exploitation in the wild has been reported. The vendor was notified early but has not issued a patch or response. This leaves users exposed until mitigations or updates are applied. The vulnerability is classified as medium severity due to the local access requirement and limited scope but remains a significant risk in environments where local access can be obtained by attackers or malicious insiders.
Potential Impact
This vulnerability can lead to unauthorized command execution on systems running vulnerable versions of mcp_code_executor, potentially allowing attackers to escalate privileges, manipulate or exfiltrate sensitive data, disrupt services, or install persistent malware. Since exploitation requires local access, the threat is particularly relevant in multi-user environments, development machines, or compromised internal networks. Organizations relying on this software for code execution or dependency management could face integrity and availability issues if attackers leverage this flaw. The lack of vendor response and patch increases the risk exposure period. While remote exploitation is not possible directly, attackers who gain local foothold through other means could use this vulnerability to deepen their control, making it a valuable post-compromise tool. The medium severity rating reflects the balance between the attack complexity and potential damage, but the impact can be severe in targeted environments.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately restrict local access to systems running mcp_code_executor to trusted users only. Implement strict access controls and monitor for unusual local activity. Since no official patch is available, consider applying manual code reviews and sanitizing inputs in the installDependencies function to prevent command injection. Employ application whitelisting and endpoint detection solutions to detect anomalous command executions. Isolate environments running this software to limit lateral movement. Regularly audit logs for suspicious local command executions. If feasible, replace or avoid using vulnerable versions until a vendor patch is released. Engage with the vendor or community to encourage timely patch development. Additionally, educate developers and administrators about the risks of local command injection and enforce secure coding practices to prevent similar issues.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-03-15T08:32:38.885Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69b7c1479d4df451833752d8
Added to database: 3/16/2026, 8:37:27 AM
Last enriched: 3/16/2026, 8:38:09 AM
Last updated: 3/16/2026, 9:44:12 PM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.