Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-5125: OS Command Injection in raine consult-llm-mcp

0
Medium
VulnerabilityCVE-2026-5125cvecve-2026-5125
Published: Mon Mar 30 2026 (03/30/2026, 17:00:13 UTC)
Source: CVE Database V5
Vendor/Project: raine
Product: consult-llm-mcp

Description

CVE-2026-5125 is a medium severity OS command injection vulnerability in raine consult-llm-mcp versions up to 2. 5. 3. The flaw exists in the child_process. execSync function within src/server. ts, where unsanitized input from git_diff. base_ref and git_diff. files can be manipulated to execute arbitrary OS commands. Exploitation requires local access and low privileges but no user interaction. The vulnerability has a CVSS score of 4.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/30/2026, 19:12:05 UTC

Technical Analysis

CVE-2026-5125 is an OS command injection vulnerability identified in the raine consult-llm-mcp software up to version 2.5.3. The vulnerability arises from improper handling of input parameters git_diff.base_ref and git_diff.files within the child_process.execSync function call in src/server.ts. This function executes shell commands synchronously, and if user-controlled inputs are not properly sanitized or validated, attackers with local access can inject arbitrary commands to be executed on the host operating system. The vulnerability requires the attacker to have local access and low privileges, but no elevated privileges or user interaction is necessary. The CVSS 4.8 score reflects a medium severity, considering the limited attack vector (local access) and the potential impact on confidentiality, integrity, and availability. The vulnerability was publicly disclosed on March 30, 2026, and a patch was released in version 2.5.4, identified by commit 4abf297b34e5e8a9cb364b35f52c5f0ca1d599d3. Although no active exploitation has been reported, the availability of exploit code increases the risk of future attacks. The flaw could allow attackers to execute arbitrary commands, potentially leading to data compromise, system disruption, or further lateral movement within a network. The affected software is likely used in environments involving AI or machine learning consulting, which may have sensitive data or critical infrastructure dependencies.

Potential Impact

The primary impact of CVE-2026-5125 is the potential for local attackers to execute arbitrary operating system commands on affected systems, which can compromise system confidentiality, integrity, and availability. Successful exploitation could allow attackers to read or modify sensitive data, disrupt services, or establish persistence for further attacks. Although the attack requires local access and low privileges, this vulnerability could be leveraged in multi-user environments or combined with other vulnerabilities to escalate privileges or move laterally within a network. Organizations relying on raine consult-llm-mcp for AI or machine learning consulting services may face operational disruptions or data breaches if exploited. The medium CVSS score reflects the moderate risk due to the local access requirement, but the presence of publicly available exploit code increases the urgency for remediation. The vulnerability does not require user interaction, which simplifies exploitation once local access is obtained.

Mitigation Recommendations

To mitigate CVE-2026-5125, organizations should immediately upgrade raine consult-llm-mcp to version 2.5.4 or later, which contains the patch addressing the command injection flaw. In addition to upgrading, organizations should implement strict access controls to limit local access to trusted users only, reducing the risk of exploitation. Employing application-level input validation and sanitization for any parameters that interact with system commands can further reduce risk. Monitoring and logging local command executions can help detect suspicious activity indicative of exploitation attempts. Network segmentation and the principle of least privilege should be enforced to contain potential breaches. Regularly auditing systems for outdated software versions and applying patches promptly is essential. If upgrading is not immediately possible, consider disabling or restricting the vulnerable functionality or running the application in a constrained environment such as a container with limited OS command execution capabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-03-30T07:55:02.890Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69cacae6e6bfc5ba1d5fd380

Added to database: 3/30/2026, 7:11:34 PM

Last enriched: 3/30/2026, 7:12:05 PM

Last updated: 3/30/2026, 9:36:14 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses