CVE-2025-11285
Published: 05 October 2025
Description
Adversaries may abuse utilities that allow for command execution to bypass security restrictions that limit the use of command-line interpreters.
Security Summary
CVE-2025-11285 is an OS command injection vulnerability affecting samanhappy MCPHub up to version 0.9.10. The issue resides in an unknown functionality within the file src/controllers/serverController.ts, where manipulation of the command/args argument enables command injection. It is associated with CWE-77 and CWE-78, carrying a CVSS v3.1 base score of 6.3 (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L).
The vulnerability is exploitable remotely by attackers who possess low privileges (PR:L) on the target system. Successful exploitation allows arbitrary OS command execution, resulting in low impacts to confidentiality, integrity, and availability.
Advisories from VulDB and a related GitHub issue indicate that the vendor was contacted early regarding the disclosure but provided no response. No patches or official mitigations are available, and an exploit has been publicly disclosed, increasing the risk of active use.
Details
- CWE(s)
Affected Products
AI Security Analysis
- AI Category
- AI Agent Protocols and Integrations
- Risk Domain
- Not Applicable
- OWASP Top 10 for LLMs 2025
- None mapped
- MITRE ATLAS Techniques
- None mapped
- Classification Reason
- The vulnerability is a standard OS command injection (CWE-78) in a TypeScript server controller of MCPHub, a general-purpose server management tool for spawning processes via stdio servers. No keywords, references, or context indicate involvement with AI, machine learning, deep learning, NLP, computer vision, models, agents, or any listed AI categories. MCPHub appears to be a non-AI software hub without AI-specific functionality.
MITRE ATT&CK Enterprise Techniques
Why these techniques?
The OS command injection vulnerability (CWE-78) in MCPHub's serverController.ts enables remote arbitrary command execution via unsanitized command/args, mapping to T1059 (Command and Scripting Interpreter), T1190 (Exploit Public-Facing Application) for remote exploitation of the web/API service, and T1202 (Indirect Command Execution) as noted in the advisory.