radare2-mcp version 1.6.0 and earlier contains an os command injection vulnerability that allows remote attackers to execute arbitrary commands by bypassing the command filter through shell metacharacters in user-controlled input passed to r2_cmd_str(). Attackers can inject shell metacharacters through the jsonrpc interface parameters to achieve remote code execution on the host running radare2-mcp without requiring authentication.
Metrics
Affected Vendors & Products
References
History
Thu, 23 Apr 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | radare2-mcp version 1.6.0 and earlier contains an os command injection vulnerability that allows remote attackers to execute arbitrary commands by bypassing the command filter through shell metacharacters in user-controlled input passed to r2_cmd_str(). Attackers can inject shell metacharacters through the jsonrpc interface parameters to achieve remote code execution on the host running radare2-mcp without requiring authentication. | |
| Title | radare2-mcp <=1.6.0 OS Command Injection via Shell Metacharacter Bypass | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-23T20:58:10.022Z
Reserved: 2026-04-23T20:52:12.685Z
Link: CVE-2026-6942
No data.
Status : Received
Published: 2026-04-23T21:16:06.947
Modified: 2026-04-23T21:16:06.947
Link: CVE-2026-6942
No data.
OpenCVE Enrichment
No data.