Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-4199: Command Injection in bazinga012 mcp_code_executor

0
Medium
VulnerabilityCVE-2026-4199cvecve-2026-4199
Published: Mon Mar 16 2026 (03/16/2026, 00:02:10 UTC)
Source: CVE Database V5
Vendor/Project: bazinga012
Product: mcp_code_executor

Description

A vulnerability was identified in bazinga012 mcp_code_executor up to 0.3.0. Affected by this issue is the function installDependencies of the file src/index.ts. Such manipulation leads to command injection. The attack can only be performed from a local environment. The exploit is publicly available and might be used. It is best practice to apply a patch to resolve this issue. The project was informed of the problem early through an issue report but has not responded yet.

AI-Powered Analysis

AILast updated: 03/16/2026, 08:38:09 UTC

Technical Analysis

The vulnerability identified as CVE-2026-4199 affects the bazinga012 mcp_code_executor software up to version 0.3.0. It resides specifically in the installDependencies function of the src/index.ts file, where improper input handling leads to command injection. This flaw allows an attacker with local access and low privileges to inject and execute arbitrary system commands, potentially compromising the host system. The attack vector is local, meaning remote exploitation is not feasible without prior access. The CVSS 4.0 vector indicates low attack complexity and no user interaction is required, but privileges are needed. The vulnerability impacts confidentiality, integrity, and availability by enabling unauthorized command execution. Although the exploit code is publicly available, no active exploitation in the wild has been reported. The vendor was notified early but has not issued a patch or response. This leaves users exposed until mitigations or updates are applied. The vulnerability is classified as medium severity due to the local access requirement and limited scope but remains a significant risk in environments where local access can be obtained by attackers or malicious insiders.

Potential Impact

This vulnerability can lead to unauthorized command execution on systems running vulnerable versions of mcp_code_executor, potentially allowing attackers to escalate privileges, manipulate or exfiltrate sensitive data, disrupt services, or install persistent malware. Since exploitation requires local access, the threat is particularly relevant in multi-user environments, development machines, or compromised internal networks. Organizations relying on this software for code execution or dependency management could face integrity and availability issues if attackers leverage this flaw. The lack of vendor response and patch increases the risk exposure period. While remote exploitation is not possible directly, attackers who gain local foothold through other means could use this vulnerability to deepen their control, making it a valuable post-compromise tool. The medium severity rating reflects the balance between the attack complexity and potential damage, but the impact can be severe in targeted environments.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately restrict local access to systems running mcp_code_executor to trusted users only. Implement strict access controls and monitor for unusual local activity. Since no official patch is available, consider applying manual code reviews and sanitizing inputs in the installDependencies function to prevent command injection. Employ application whitelisting and endpoint detection solutions to detect anomalous command executions. Isolate environments running this software to limit lateral movement. Regularly audit logs for suspicious local command executions. If feasible, replace or avoid using vulnerable versions until a vendor patch is released. Engage with the vendor or community to encourage timely patch development. Additionally, educate developers and administrators about the risks of local command injection and enforce secure coding practices to prevent similar issues.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-03-15T08:32:38.885Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69b7c1479d4df451833752d8

Added to database: 3/16/2026, 8:37:27 AM

Last enriched: 3/16/2026, 8:38:09 AM

Last updated: 3/16/2026, 9:44:12 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses