Vulnerability Description
A vulnerability was identified in elgentos magento2-dev-mcp up to 1.0.2. The affected element is the function executeMagerun2Command of the file src/index.ts. Such manipulation leads to os command injection. An attack has to be approached locally. The exploit is publicly available and might be used. The name of the patch is aa1ffcc0aea1b212c69787391783af27df15ae9d. A patch should be applied to remediate this issue.
CVSS Score
MEDIUM
Related Weaknesses (CWE)
References
- https://github.com/elgentos/magento2-dev-mcp/
- https://github.com/elgentos/magento2-dev-mcp/commit/aa1ffcc0aea1b212c69787391783
- https://github.com/elgentos/magento2-dev-mcp/issues/4
- https://github.com/elgentos/magento2-dev-mcp/pull/5
- https://github.com/user-attachments/files/25895777/magento2-dev-mcp_bug.pdf
- https://vuldb.com/submit/784864
- https://vuldb.com/vuln/355395
- https://vuldb.com/vuln/355395/cti
FAQ
What is CVE-2026-5603?
CVE-2026-5603 is a vulnerability with a CVSS score of 5.3 (MEDIUM). A vulnerability was identified in elgentos magento2-dev-mcp up to 1.0.2. The affected element is the function executeMagerun2Command of the file src/index.ts. Such manipulation leads to os command inj...
How severe is CVE-2026-5603?
CVE-2026-5603 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-5603?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.