<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Mcp-Server-Semgrep — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/mcp-server-semgrep/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 30 Apr 2026 00:17:01 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/mcp-server-semgrep/feed.xml" rel="self" type="application/rss+xml"/><item><title>VetCoders mcp-server-semgrep OS Command Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-vetcoders-command-injection/</link><pubDate>Thu, 30 Apr 2026 00:17:01 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-vetcoders-command-injection/</guid><description>VetCoders mcp-server-semgrep version 1.0.0 is vulnerable to remote OS command injection due to manipulation of the ID argument in several functions of the MCP Interface component.</description><content:encoded><![CDATA[<p>A critical OS command injection vulnerability has been identified in VetCoders mcp-server-semgrep version 1.0.0. The vulnerability resides within the MCP Interface component, specifically affecting the <code>analyze_results</code>, <code>filter_results</code>, <code>export_results</code>, <code>compare_results</code>, <code>scan_directory</code>, and <code>create_rule</code> functions in the <code>src/index.ts</code> file. Successful exploitation allows for remote attackers to inject and execute arbitrary operating system commands on the affected system. The vulnerability is publicly known and actively exploitable. VetCoders has released version 1.0.1 to address this issue, with patch <code>141335da044e53c3f5b315e0386e01238405b771</code> containing the fix. Defenders should prioritize upgrading to version 1.0.1 to mitigate this risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable instance of VetCoders mcp-server-semgrep version 1.0.0.</li>
<li>The attacker crafts a malicious request targeting one of the vulnerable functions: <code>analyze_results</code>, <code>filter_results</code>, <code>export_results</code>, <code>compare_results</code>, <code>scan_directory</code>, or <code>create_rule</code>.</li>
<li>The malicious request includes a manipulated <code>ID</code> argument designed to inject OS commands.</li>
<li>The application fails to properly sanitize or validate the <code>ID</code> argument.</li>
<li>The application executes the injected OS command using a function such as <code>exec</code>, <code>system</code>, or equivalent within the affected functions in <code>src/index.ts</code>.</li>
<li>The injected command executes with the privileges of the mcp-server-semgrep process.</li>
<li>The attacker gains arbitrary code execution on the server.</li>
<li>The attacker can then perform actions such as data exfiltration, lateral movement, or denial of service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a remote attacker to execute arbitrary operating system commands on the affected server. This could lead to complete system compromise, including data theft, modification, or destruction. Depending on the server&rsquo;s role and the attacker&rsquo;s objectives, this could result in significant financial loss, reputational damage, and disruption of services. There is no information about specific victim counts or targeted sectors.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to VetCoders mcp-server-semgrep version 1.0.1 to remediate the vulnerability as identified in CVE-2026-7446.</li>
<li>Monitor web server logs for suspicious requests targeting the <code>/src/index.ts</code> file with unusual or potentially malicious input in the <code>ID</code> argument, using the Sigma rules provided.</li>
<li>Implement input validation and sanitization for all user-supplied input, especially the <code>ID</code> parameter, to prevent command injection attacks.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>command-injection</category><category>vulnerability</category><category>mcp-server-semgrep</category></item></channel></rss>