Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-8jx2-rhfh-q928 | godot-mcp has Command Injection via unsanitized projectPath |
Wed, 18 Mar 2026 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Coding-solo godot Mcp
|
|
| CPEs | cpe:2.3:a:coding-solo:godot_mcp:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Coding-solo godot Mcp
|
Thu, 05 Feb 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 05 Feb 2026 11:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Coding-solo
Coding-solo godot-mcp |
|
| Vendors & Products |
Coding-solo
Coding-solo godot-mcp |
Wed, 04 Feb 2026 22:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Godot MCP is a Model Context Protocol (MCP) server for interacting with the Godot game engine. Prior to version 0.1.1, a command injection vulnerability in godot-mcp allows remote code execution. The executeOperation function passed user-controlled input (e.g., projectPath) directly to exec(), which spawns a shell. An attacker could inject shell metacharacters like $(command) or &calc to execute arbitrary commands with the privileges of the MCP server process. This affects any tool that accepts projectPath, including create_scene, add_node, load_sprite, and others. This issue has been patched in version 0.1.1. | |
| Title | Godot MCP is vulnerable to Command Injection via unsanitized projectPath | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-05T17:51:29.147Z
Reserved: 2026-02-02T19:59:47.375Z
Link: CVE-2026-25546
Updated: 2026-02-05T17:51:25.844Z
Status : Analyzed
Published: 2026-02-04T22:16:00.667
Modified: 2026-03-18T14:25:39.043
Link: CVE-2026-25546
No data.
OpenCVE Enrichment
Updated: 2026-04-18T13:45:45Z
Github GHSA