CVE-2026-2130
Published: 08 February 2026
Description
A vulnerability was determined in BurtTheCoder mcp-maigret up to 1.0.12. This affects an unknown part of the file src/index.ts of the component search_username. Executing a manipulation of the argument Username can lead to command injection. The attack may be launched…
more
remotely. Upgrading to version 1.0.13 is able to mitigate this issue. This patch is called b1ae073c4b3e789ab8de36dc6ca8111ae9399e7a. Upgrading the affected component is advised.
Mitigating Controls (NIST 800-53 r5)AI
Directly prevents command injection by requiring validation and sanitization of the Username argument before processing in the search_username component.
Ensures timely patching and upgrading of vulnerable software, such as applying the fix in mcp-maigret version 1.0.13 to remediate the command injection flaw.
Facilitates detection of command injection exploitation through monitoring for anomalous system calls or processes triggered by manipulated Username inputs.
Security SummaryAI
CVE-2026-2130 is a command injection vulnerability (CWE-74, CWE-77) affecting BurtTheCoder's mcp-maigret software in versions up to 1.0.12. The flaw exists in an unknown part of the src/index.ts file within the search_username component, where manipulation of the Username argument enables the injection.
With a CVSS v3.1 base score of 6.3 (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L), the vulnerability can be exploited remotely by an attacker possessing low privileges, with low attack complexity and no requirement for user interaction. Successful exploitation allows command injection, resulting in limited impacts to confidentiality, integrity, and availability.
Mitigation is achieved by upgrading to version 1.0.13, which incorporates the patch commit b1ae073c4b3e789ab8de36dc6ca8111ae9399e7a. Relevant advisories and resources are available on GitHub, including the repository, the patch commit, issue #9, pull request #10, and the v1.0.13 release tag.
Details
- CWE(s)
Affected Products
AI Security AnalysisAI
- AI Category
- AI Agent Protocols and Integrations
- Risk Domain
- Protocol-Specific Risks
- OWASP Top 10 for LLMs 2025
- None mapped
- MITRE ATLAS Techniques
- None mapped
- Classification Reason
- Matched keywords: mcp
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Command injection vulnerability enables remote exploitation of a service (T1210) to execute arbitrary commands via a scripting interpreter (T1059).