Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 04 May 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Crazyrabbitltc
Crazyrabbitltc mcp-code-review-server |
|
| Vendors & Products |
Crazyrabbitltc
Crazyrabbitltc mcp-code-review-server |
Mon, 04 May 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sat, 02 May 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was detected in crazyrabbitLTC mcp-code-review-server up to 0.1.0. This issue affects the function executeRepomix of the file src/repomix.ts of the component RepoMix Command Handler. Performing a manipulation results in command injection. The attack may be initiated remotely. The exploit is now public and may be used. The project was informed of the problem early through a pull request but has not reacted yet. | |
| Title | crazyrabbitLTC mcp-code-review-server RepoMix repomix.ts executeRepomix command injection | |
| Weaknesses | CWE-74 CWE-77 |
|
| References |
|
|
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-05-04T12:56:34.250Z
Reserved: 2026-05-01T14:22:12.238Z
Link: CVE-2026-7628
Updated: 2026-05-04T12:56:29.811Z
Status : Deferred
Published: 2026-05-02T12:16:17.163
Modified: 2026-05-05T19:15:06.200
Link: CVE-2026-7628
No data.
OpenCVE Enrichment
Updated: 2026-05-04T16:06:54Z