Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 12 Feb 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 12 Feb 2026 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Akutishevsky
Akutishevsky sf-mcp-server |
|
| Vendors & Products |
Akutishevsky
Akutishevsky sf-mcp-server |
Wed, 11 Feb 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | sf-mcp-server is an implementation of Salesforce MCP server for Claude for Desktop. A command injection vulnerability exists in sf-mcp-server due to unsafe use of child_process.exec when constructing Salesforce CLI commands with user-controlled input. Successful exploitation allows attackers to execute arbitrary shell commands with the privileges of the MCP server process. | |
| Title | sf-mcp-server has a Command Injection in query_records tool due to unsafe use of child_process.exec | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-12T15:41:13.182Z
Reserved: 2026-02-09T21:36:29.555Z
Link: CVE-2026-26029
Updated: 2026-02-12T15:41:01.785Z
Status : Deferred
Published: 2026-02-11T22:15:52.373
Modified: 2026-04-15T00:35:42.020
Link: CVE-2026-26029
No data.
OpenCVE Enrichment
Updated: 2026-04-17T20:15:27Z