Description
A vulnerability was identified in elgentos magento2-dev-mcp up to 1.0.2. The affected element is the function executeMagerun2Command of the file src/index.ts. Such manipulation leads to os command injection. An attack has to be approached locally. The exploit is publicly available and might be used. The name of the patch is aa1ffcc0aea1b212c69787391783af27df15ae9d. A patch should be applied to remediate this issue.
Problem types
Product status
1.0.1
1.0.2
Timeline
| 2026-04-05: | Advisory disclosed |
| 2026-04-05: | VulDB entry created |
| 2026-04-05: | VulDB entry last update |
Credits
Yinci Chen (VulDB User)
References
vuldb.com/vuln/355395 (VDB-355395 | elgentos magento2-dev-mcp index.ts executeMagerun2Command os command injection)
vuldb.com/vuln/355395/cti (VDB-355395 | CTI Indicators (IOB, IOC, TTP, IOA))
vuldb.com/submit/784864 (Submit #784864 | elgentos magento2-dev-mcp <=1.0.2 Command Injection)
github.com/elgentos/magento2-dev-mcp/issues/4
github.com/elgentos/magento2-dev-mcp/pull/5
github.com/…hments/files/25895777/magento2-dev-mcp_bug.pdf
github.com/…ommit/aa1ffcc0aea1b212c69787391783af27df15ae9d
github.com/elgentos/magento2-dev-mcp/
