CVE-2026-2008
Unknown Unknown - Not Provided
Remote Code Injection in abhiphile fermat-mcp eqn_chart Function

Publication date: 2026-02-06

Last updated on: 2026-04-29

Assigner: VulDB

Description
A vulnerability was detected in abhiphile fermat-mcp up to 47f11def1cd37e45dd060f30cdce346cbdbd6f0a. This vulnerability affects the function eqn_chart of the file fmcp/mpl_mcp/core/eqn_chart.py. Performing a manipulation of the argument equations results in code injection. It is possible to initiate the attack remotely. The exploit is now public and may be used. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available. The project was informed of the problem early through an issue report but has not responded yet.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-06
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2026-02-06
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
abhiphile fermat to 2025-10-08 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-74 The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.
CWE-94 The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

[{'type': 'paragraph', 'content': 'CVE-2026-2008 is a code injection vulnerability in the fermat-mcp project, specifically in the eqn_chart function of the file fmcp/mpl_mcp/core/eqn_chart.py.'}, {'type': 'paragraph', 'content': "The vulnerability occurs because the eqn_chart tool uses Python's eval function to process the 'equations' parameter. Although eval is called with a restricted execution scope, attackers can bypass these restrictions to execute arbitrary code."}, {'type': 'paragraph', 'content': 'This means that by manipulating the input to the equations argument, an attacker can inject and run malicious code remotely on the server running fermat-mcp.'}] [2, 3, 4]


How can this vulnerability impact me? :

[{'type': 'paragraph', 'content': 'This vulnerability allows an attacker to execute arbitrary code remotely on the fermat-mcp server, which can lead to serious security consequences.'}, {'type': 'list_item', 'content': "If the MCP service is running locally without sandboxing, arbitrary commands can be executed with the current user's privileges."}, {'type': 'list_item', 'content': 'If strong sandboxing is in place locally, command execution is confined but still possible.'}, {'type': 'list_item', 'content': 'In remote single-tenant or private deployments, remote code execution can compromise the server depending on host isolation.'}, {'type': 'list_item', 'content': 'In multi-tenant or SaaS deployments, this can lead to critical cross-tenant compromise and potentially a full service breach.'}, {'type': 'paragraph', 'content': 'Overall, the vulnerability affects confidentiality, integrity, and availability of the system, making it a significant security risk.'}] [2, 4]


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': "This vulnerability involves code injection via the eqn_chart tool's equations parameter, which uses Python's eval function insecurely. Detection can focus on monitoring or inspecting requests or inputs to the eqn_chart functionality for suspicious payloads that attempt to execute arbitrary code."}, {'type': 'paragraph', 'content': "Since the vulnerability is exploited by sending crafted equations that get evaluated, detection commands could include searching logs or network traffic for suspicious payload patterns such as usage of Python's __import__ function or system command calls embedded in the equations parameter."}, {'type': 'list_item', 'content': 'Use network packet capture tools (e.g., tcpdump, Wireshark) to filter traffic to the fermat-mcp server and look for suspicious payloads containing keywords like "__import__", "os.system", or other command execution attempts.'}, {'type': 'list_item', 'content': 'Search application logs for requests to eqn_chart with unusual or unexpected input patterns, for example using grep or similar tools: grep -r "__import__" /path/to/fermat-mcp/logs'}, {'type': 'list_item', 'content': 'If the fermat-mcp server exposes an API or command line interface, test it with safe payloads and then with known exploit payloads (in a controlled environment) to observe if arbitrary code execution occurs.'}, {'type': 'paragraph', 'content': 'No specific detection commands or tools are provided in the available resources, but focusing on monitoring eval usage and suspicious input patterns related to the equations parameter is recommended.'}] [2, 3, 4]


What immediate steps should I take to mitigate this vulnerability?

[{'type': 'paragraph', 'content': 'Immediate mitigation steps include restricting or disabling access to the vulnerable eqn_chart functionality to prevent exploitation, especially from untrusted or remote sources.'}, {'type': 'paragraph', 'content': "Since the vulnerability arises from unsafe use of Python's eval function on user-supplied input, consider the following actions:"}, {'type': 'list_item', 'content': 'Disable or restrict the eqn_chart feature until a secure patch or update is available.'}, {'type': 'list_item', 'content': 'Implement network-level access controls or firewall rules to limit access to the fermat-mcp server to trusted users or networks only.'}, {'type': 'list_item', 'content': 'Run the fermat-mcp service in a strong sandbox or container environment with minimal privileges to limit the impact of any potential code execution.'}, {'type': 'list_item', 'content': 'Monitor for exploitation attempts and unusual activity related to the fermat-mcp server.'}, {'type': 'paragraph', 'content': 'The project maintainers have not yet responded or issued a fix, and no known mitigations or countermeasures have been published. It is suggested to consider replacing the affected software with an alternative product if possible.'}] [4, 2]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart