CVE-2025-61492
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2026-01-07

Last updated on: 2026-01-08

Assigner: MITRE

Description
A command injection vulnerability in the execute_command function of terminal-controller-mcp 0.1.7 allows attackers to execute arbitrary commands via a crafted input.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-07
Last Modified
2026-01-08
Generated
2026-05-07
AI Q&A
2026-01-07
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
unknown_vendor terminal-controller-mcp 0.1.7
unknown_vendor mcp 2.0.13
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-77 The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-61492 is a critical command injection vulnerability in the execute_command function of terminal-controller-mcp version 0.1.7. The vulnerability arises because the command validation uses a simplistic keyword blacklist filter that only detects exact or contiguous occurrences of dangerous commands like "rm -rf /" and "mkfs". Attackers can bypass this filter by using shell features such as command concatenation and command substitution ($()), which allow them to split restricted commands into fragments and reassemble them dynamically at runtime. This means an attacker can craft inputs that evade the blacklist and execute arbitrary commands on the system. The root cause is executing user input in a shell context without robust validation or a whitelist approach, enabling arbitrary command execution. [1]


How can this vulnerability impact me? :

This vulnerability allows attackers to execute arbitrary commands on the affected system by bypassing the command filter. This can lead to unauthorized system access, data manipulation or deletion, installation of malware, or disruption of services. Because the commands are executed with the privileges of the running application, an attacker could potentially gain control over the system or compromise its integrity and confidentiality. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

Detection can be performed by monitoring for suspicious JSON requests sent to the vulnerable server that contain crafted command inputs exploiting shell features like command substitution ($()) or command concatenation to bypass keyword filters. For example, commands containing patterns such as `echo "$($(echo -n m; echo -n k; echo -n f; echo -n s))"` or payloads with `$()` indicate attempts to exploit the vulnerability. Network traffic inspection tools or logs can be searched for these patterns. Additionally, reviewing server logs for execution of unexpected or restricted commands can help identify exploitation attempts. Specific commands to test the vulnerability include sending crafted JSON requests with payloads like `echo "$($(echo -n m; echo -n k; echo -n f; echo -n s))"` to the execute_command endpoint and observing if the restricted commands are executed. [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include: 1) Implementing a more robust command validation system that detects and blocks dynamically constructed prohibited commands after shell parsing, rather than relying on simple keyword blacklists. 2) Adopting a whitelist approach that allows only safe commands instead of blacklisting dangerous ones. 3) Avoid executing arbitrary command strings in a shell context; specifically, configure command execution functions (e.g., execFileAsync) with shell set to false to prevent shell interpretation of user inputs. 4) Apply patches or updates that fix the vulnerability by disabling shell usage during command execution or improving input sanitization. 5) Monitor and restrict incoming requests to the vulnerable execute_command function to prevent exploitation until a fix is applied. [1, 2]


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The provided resources do not contain information about how this vulnerability affects compliance with common standards and regulations such as GDPR or HIPAA.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart