Cyber Posture

CVE-2026-22688

CriticalPublic PoC

Published: 10 January 2026

Published
10 January 2026
Modified
22 January 2026
KEV Added
Patch
CVSS Score 9.9 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
EPSS Score 0.0040 60.5th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

WeKnora is an LLM-powered framework designed for deep document understanding and semantic retrieval. Prior to version 0.2.5, there is a command injection vulnerability that allows authenticated users to inject stdio_config.command/args into MCP stdio settings, causing the server to execute subprocesses…

more

using these injected values. This issue has been patched in version 0.2.5.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly prevents command injection by validating and sanitizing user-supplied inputs to stdio_config.command/args before subprocess execution.

prevent

Addresses the specific flaw in WeKnora prior to version 0.2.5 by requiring identification, reporting, and timely remediation through patching.

prevent

Limits the impact of injected commands by enforcing least privilege on authenticated users and server processes executing subprocesses.

Security SummaryAI

CVE-2026-22688 is a command injection vulnerability (CWE-77) affecting WeKnora, an LLM-powered framework for deep document understanding and semantic retrieval. In versions prior to 0.2.5, the vulnerability enables authenticated users to inject malicious values into the stdio_config.command/args fields within MCP stdio settings. This injection causes the server to execute arbitrary subprocesses using the attacker-supplied values. The issue carries a CVSS v3.1 base score of 9.9 (AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H), indicating critical severity due to its potential for complete system compromise.

An attacker with authenticated access to the WeKnora server can exploit this vulnerability remotely over the network with low complexity and no user interaction required. By manipulating the stdio_config parameters, the attacker can execute arbitrary commands as the server process, achieving high-impact confidentiality, integrity, and availability violations. The changed scope (S:C) amplifies the risk, as successful exploitation allows control over subprocesses that could lead to full server takeover, data exfiltration, or further lateral movement.

The vulnerability has been addressed in WeKnora version 0.2.5, as detailed in the project's GitHub security advisory (GHSA-78h3-63c4-5fqc) and corresponding patch commit (f7900a5e9a18c99d25cec9589ead9e4e59ce04bb). Security practitioners should prioritize upgrading to the patched version and review access controls for authenticated users interacting with MCP stdio configurations.

As an LLM-powered framework, this vulnerability highlights risks in AI/ML pipelines where untrusted inputs can propagate to system-level execution, though no evidence of real-world exploitation is reported in available sources.

Details

CWE(s)

Affected Products

tencent
weknora
≤ 0.2.5

AI Security AnalysisAI

AI Category
AI Agent Protocols and Integrations
Risk Domain
Protocol-Specific Risks
OWASP Top 10 for LLMs 2025
None mapped
MITRE ATLAS Techniques
None mapped
Classification Reason
Matched keywords: llm, mcp

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059 Command and Scripting Interpreter Execution
Adversaries may abuse command and script interpreters to execute commands, scripts, or binaries.
T1210 Exploitation of Remote Services Lateral Movement
Adversaries may exploit remote services to gain unauthorized access to internal systems once inside of a network.
Why these techniques?

Command injection in a remotely accessible server enables exploitation of public-facing application (T1190) or remote services (T1210), facilitating arbitrary command execution (T1059).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References