CVE-2025-11490
BaseFortify
Publication date: 2025-10-08
Last updated on: 2026-04-29
Assigner: VulDB
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| wonderwhy-er | desktopcommandermcp | to 0.2.13 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-77 | The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component. |
| CWE-78 | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the extractBaseCommand function of the Absolute Path Handler component in wonderwhy-er DesktopCommanderMCP up to version 0.2.13. It allows an attacker to perform OS command injection remotely by manipulating how commands are extracted and executed, potentially leading to unauthorized command execution on the affected system.
How can this vulnerability impact me? :
The vulnerability can allow a remote attacker to execute arbitrary operating system commands on the affected system, which may lead to unauthorized access, data compromise, or disruption of services depending on the privileges of the affected process.