Cyber Posture

CVE-2026-6942

CriticalPublic PoC

Published: 23 April 2026

Published
23 April 2026
Modified
29 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0035 57.2th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

radare2-mcp version 1.6.0 and earlier contains an os command injection vulnerability that allows remote attackers to execute arbitrary commands by bypassing the command filter through shell metacharacters in user-controlled input passed to r2_cmd_str(). Attackers can inject shell metacharacters through the…

more

jsonrpc interface parameters to achieve remote code execution on the host running radare2-mcp without requiring authentication.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires validation of user-controlled JSON-RPC parameters to block shell metacharacters from bypassing the command filter and executing arbitrary OS commands.

prevent

Mandates timely flaw remediation by applying the specific patch available in radare2-mcp commit 482cde6500009112a8bc0b3fa8d2ef6180581ec0 to eliminate the command injection vulnerability.

prevent

Enforces least privilege for the radare2-mcp process, limiting the scope and impact of arbitrary OS commands executed via the injection vulnerability.

Security SummaryAI

CVE-2026-6942 is an OS command injection vulnerability (CWE-78) in radare2-mcp version 1.6.0 and earlier. The flaw occurs in the r2_cmd_str() function, where user-controlled input passed through JSON-RPC interface parameters can bypass the command filter using shell metacharacters, allowing attackers to execute arbitrary OS commands.

Remote attackers can exploit this vulnerability over the network without authentication, requiring low complexity and no user interaction (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H, score 9.8). Exploitation achieves remote code execution on the host running radare2-mcp by injecting shell metacharacters into the affected parameters.

A patch addressing the vulnerability is available in a commit to the radare2-mcp repository at https://github.com/radareorg/radare2-mcp/commit/482cde6500009112a8bc0b3fa8d2ef6180581ec0. Further details on the issue and remediation are provided in the GitHub issue tracker at https://github.com/radareorg/radare2-mcp/issues/45 and the VulnCheck advisory at https://www.vulncheck.com/advisories/radare2-mcp-os-command-injection-via-shell-metacharacter-bypass.

Details

CWE(s)

AI Security AnalysisAI

AI Category
AI Agent Protocols and Integrations
Risk Domain
Protocol-Specific Risks
OWASP Top 10 for LLMs 2025
None mapped
MITRE ATLAS Techniques
None mapped
Classification Reason
Matched keywords: mcp, mcp

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059 Command and Scripting Interpreter Execution
Adversaries may abuse command and script interpreters to execute commands, scripts, or binaries.
Why these techniques?

Unauthenticated remote OS command injection via JSON-RPC interface enables exploitation of public-facing application (T1190) leading to arbitrary command execution (T1059).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References