CVE-2026-6942
Published: 23 April 2026
Description
radare2-mcp version 1.6.0 and earlier contains an os command injection vulnerability that allows remote attackers to execute arbitrary commands by bypassing the command filter through shell metacharacters in user-controlled input passed to r2_cmd_str(). Attackers can inject shell metacharacters through the…
more
jsonrpc interface parameters to achieve remote code execution on the host running radare2-mcp without requiring authentication.
Mitigating Controls (NIST 800-53 r5)AI
Requires validation of user-controlled JSON-RPC parameters to block shell metacharacters from bypassing the command filter and executing arbitrary OS commands.
Mandates timely flaw remediation by applying the specific patch available in radare2-mcp commit 482cde6500009112a8bc0b3fa8d2ef6180581ec0 to eliminate the command injection vulnerability.
Enforces least privilege for the radare2-mcp process, limiting the scope and impact of arbitrary OS commands executed via the injection vulnerability.
Security SummaryAI
CVE-2026-6942 is an OS command injection vulnerability (CWE-78) in radare2-mcp version 1.6.0 and earlier. The flaw occurs in the r2_cmd_str() function, where user-controlled input passed through JSON-RPC interface parameters can bypass the command filter using shell metacharacters, allowing attackers to execute arbitrary OS commands.
Remote attackers can exploit this vulnerability over the network without authentication, requiring low complexity and no user interaction (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H, score 9.8). Exploitation achieves remote code execution on the host running radare2-mcp by injecting shell metacharacters into the affected parameters.
A patch addressing the vulnerability is available in a commit to the radare2-mcp repository at https://github.com/radareorg/radare2-mcp/commit/482cde6500009112a8bc0b3fa8d2ef6180581ec0. Further details on the issue and remediation are provided in the GitHub issue tracker at https://github.com/radareorg/radare2-mcp/issues/45 and the VulnCheck advisory at https://www.vulncheck.com/advisories/radare2-mcp-os-command-injection-via-shell-metacharacter-bypass.
Details
- CWE(s)
AI Security AnalysisAI
- AI Category
- AI Agent Protocols and Integrations
- Risk Domain
- Protocol-Specific Risks
- OWASP Top 10 for LLMs 2025
- None mapped
- MITRE ATLAS Techniques
- None mapped
- Classification Reason
- Matched keywords: mcp, mcp
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Unauthenticated remote OS command injection via JSON-RPC interface enables exploitation of public-facing application (T1190) leading to arbitrary command execution (T1059).