Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 20 Apr 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:agent-zero:agent-zero:0.9.8:-:*:*:*:*:*:* |
Wed, 15 Apr 2026 22:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Remote Code Execution via Malicious MCP Server Configuration in Agent Zero 0.9.8 |
Wed, 15 Apr 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Agent-zero
Agent-zero agent-zero |
|
| Vendors & Products |
Agent-zero
Agent-zero agent-zero |
Wed, 15 Apr 2026 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-77 | |
| Metrics |
cvssV3_1
|
Wed, 15 Apr 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Agent Zero 0.9.8 contains a remote code execution vulnerability in its External MCP Servers configuration feature. The application allows users to define MCP servers using a JSON configuration containing arbitrary command and args values. These values are executed by the application when the configuration is applied without sufficient validation or restriction. An attacker may supply a malicious MCP configuration to execute arbitrary operating system commands, potentially resulting in remote code execution with the privileges of the Agent Zero process. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-04-15T18:02:40.808Z
Reserved: 2026-03-04T00:00:00.000Z
Link: CVE-2026-30624
Updated: 2026-04-15T18:02:35.117Z
Status : Analyzed
Published: 2026-04-15T16:16:36.677
Modified: 2026-04-20T20:17:28.843
Link: CVE-2026-30624
No data.
OpenCVE Enrichment
Updated: 2026-04-15T22:30:16Z