Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 15 May 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 15 May 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | MCP Calculate Server is a mathematical calculation service based on MCP protocol and SymPy library. Prior to 0.1.1, the use of eval() to evaluate mathematical expressions without proper input sanitization leads to remote code execution. This vulnerability is fixed in 0.1.1. | |
| Title | MCP Calculate Server: Prompt Injection to RCE | |
| Weaknesses | CWE-1427 CWE-94 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-15T17:25:39.779Z
Reserved: 2026-05-07T18:04:17.307Z
Link: CVE-2026-44717
Updated: 2026-05-15T17:25:34.852Z
Status : Received
Published: 2026-05-15T17:16:48.073
Modified: 2026-05-15T17:16:48.073
Link: CVE-2026-44717
No data.
OpenCVE Enrichment
Updated: 2026-05-15T18:30:05Z