Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-xqv9-qr76-hfq2 | @elgentos/magento2-dev-mcp vulnerable to command injection |
Tue, 07 Apr 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Elgentos
Elgentos magento2-dev-mcp |
|
| Vendors & Products |
Elgentos
Elgentos magento2-dev-mcp |
Mon, 06 Apr 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sun, 05 Apr 2026 23:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was identified in elgentos magento2-dev-mcp up to 1.0.2. The affected element is the function executeMagerun2Command of the file src/index.ts. Such manipulation leads to os command injection. An attack has to be approached locally. The exploit is publicly available and might be used. The name of the patch is aa1ffcc0aea1b212c69787391783af27df15ae9d. A patch should be applied to remediate this issue. | |
| Title | elgentos magento2-dev-mcp index.ts executeMagerun2Command os command injection | |
| Weaknesses | CWE-77 CWE-78 |
|
| References |
|
|
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-04-06T14:50:10.379Z
Reserved: 2026-04-05T13:58:08.432Z
Link: CVE-2026-5603
Updated: 2026-04-06T14:33:53.773Z
Status : Deferred
Published: 2026-04-05T23:16:20.390
Modified: 2026-04-29T01:00:01.613
Link: CVE-2026-5603
No data.
OpenCVE Enrichment
Updated: 2026-04-06T21:48:05Z
Github GHSA