CVE-2025-61492
CRITICALCVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Lifecycle Timeline
3Description
A command injection vulnerability in the execute_command function of terminal-controller-mcp 0.1.7 allows attackers to execute arbitrary commands via a crafted input.
Analysis
terminal-controller-mcp 0.1.7, an MCP (Model Context Protocol) server for terminal control, has command injection in execute_command that allows arbitrary command execution. Maximum CVSS 10.0 with scope change – compromising the MCP server grants control over all connected AI agents.
Technical Context
The execute_command function does not sanitize input before passing it to a shell (CWE-77). As an MCP server, it mediates between AI agents and the terminal – command injection here means any AI agent interaction can be weaponized. The scope change reflects that compromise of the MCP server affects all connected agents and their capabilities.
Affected Products
terminal-controller-mcp 0.1.7
Remediation
Update to a patched version. Implement strict input validation in the execute_command function. Run MCP servers in isolated containers with minimal permissions.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
GHSA-h4rf-624j-gj33