Description
A security flaw has been discovered in r-huijts mcp-server-rijksmuseum up to 1.0.4. Affected is the function open_image_in_browser of the file src/index.ts of the component MCP Interface. Performing a manipulation of the argument imageUrl results in os command injection. The attack is possible to be carried out remotely. The exploit has been released to the public and may be used for attacks. The project was informed of the problem early through an issue report but has not responded yet.
Problem types
Product status
1.0.1
1.0.2
1.0.3
1.0.4
Timeline
| 2026-05-01: | Advisory disclosed |
| 2026-05-01: | VulDB entry created |
| 2026-05-01: | VulDB entry last update |
Credits
BruceJqs (VulDB User)
VulDB CNA Team
References
vuldb.com/vuln/360778 (VDB-360778 | r-huijts mcp-server-rijksmuseum MCP index.ts open_image_in_browser os command injection)
vuldb.com/vuln/360778/cti (VDB-360778 | CTI Indicators (IOB, IOC, TTP, IOA))
vuldb.com/submit/806909 (Submit #806909 | r-huijts mcp-server-rijksmuseum 1.0.4 Command Injection)
github.com/r-huijts/rijksmuseum-mcp/issues/9
