CVE-2025-35028
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-11-30

Last updated on: 2025-12-01

Assigner: Austin Hackers Anonymous

Description
By providing a command-line argument starting with a semi-colon ; to an API endpoint created by the EnhancedCommandExecutor class of the HexStrike AI MCP server, the resultant composed command is executed directly in the context of the MCP server’s normal privilege; typically, this is root. There is no attempt to sanitize these arguments in the default configuration of this MCP server at the affected version (as of commit 2f3a5512 in September of 2025).
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-11-30
Last Modified
2025-12-01
Generated
2026-05-06
AI Q&A
2025-12-01
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
hexstrike ai_mcp_server *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-78 The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability occurs in the HexStrike AI MCP server where an API endpoint created by the EnhancedCommandExecutor class accepts command-line arguments starting with a semicolon (;). These arguments are not sanitized, causing the server to execute the composed command directly with the server's normal privileges, which are typically root. This allows an attacker to execute arbitrary commands on the server.


How can this vulnerability impact me? :

The vulnerability allows an attacker to execute arbitrary commands on the HexStrike AI MCP server with root privileges. This can lead to full system compromise, unauthorized access to sensitive data, disruption of services, and potential further exploitation within the affected environment.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart