CVE-2026-30625
Remote Code Execution in Upsonic MCP Task Creation
Publication date: 2026-04-15
Last updated on: 2026-04-16
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| upsonic | upsonic | 0.71.6 |
| upsonic | upsonic | 0.72.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-77 | The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
Upsonic version 0.71.6 has a remote code execution vulnerability in its MCP server/task creation functionality. Users can define MCP tasks with arbitrary command and argument values. Although there is an allowlist of commands, some allowed commands like npm and npx accept argument flags that can be exploited to execute arbitrary operating system commands. This means an attacker can craft malicious MCP tasks that run code remotely with the same privileges as the Upsonic process.
In version 0.72.0, Upsonic added a warning about the risks of using Stdio servers, which can execute commands directly on the machine.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability in Upsonic 0.71.6 allows remote code execution through its MCP server/task creation functionality, potentially enabling attackers to execute arbitrary OS commands with the privileges of the Upsonic process.
Such a vulnerability could lead to unauthorized access or manipulation of sensitive data, which may impact compliance with data protection regulations like GDPR or HIPAA that require safeguarding personal and health information.
However, the provided context does not explicitly mention any direct effects or assessments related to compliance with these standards.
How can this vulnerability impact me? :
This vulnerability can allow an attacker to remotely execute arbitrary code on the machine running Upsonic with the same privileges as the Upsonic process. This could lead to unauthorized control over the system, data theft, data corruption, installation of malware, or disruption of services.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, upgrade Upsonic to version 0.72.0 or later, where a warning about the risks of using Stdio servers that can execute commands directly on the machine has been added.
Avoid creating MCP tasks that use the allowed commands 'npm' or 'npx' with argument flags that could enable arbitrary OS command execution.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability involves the Upsonic 0.71.6 MCP server allowing remote code execution via crafted MCP tasks using allowed commands like npm or npx with argument flags that execute arbitrary OS commands.
To detect this vulnerability on your system or network, you should check if you are running Upsonic version 0.71.6 or earlier versions that do not include the warning or mitigations introduced in 0.72.0.
You can look for suspicious MCP task creation requests or configurations that use npm or npx commands with unusual or potentially malicious arguments.
Suggested commands to help detect potential exploitation attempts or vulnerable configurations include:
- Use network monitoring tools (e.g., tcpdump, Wireshark) to capture and inspect traffic to the MCP server for commands invoking npm or npx with suspicious arguments.
- On the system running Upsonic, search for MCP task definitions or logs containing npm or npx commands with flags that could lead to command execution, for example:
- grep -rE 'npm|npx' /path/to/upsonic/configs /path/to/upsonic/logs
- Check running Upsonic process version:
- upsonic --version
- If possible, review MCP task creation API calls or logs for suspicious payloads.
Note: The provided context and resources do not include explicit detection commands or scripts, so these suggestions are based on the vulnerability description.