CVE-2026-5602
Received Received - Intake
OS Command Injection in Nor2-io heim-mcp registerTools Function

Publication date: 2026-04-05

Last updated on: 2026-04-29

Assigner: VulDB

Description
A vulnerability was determined in Nor2-io heim-mcp up to 0.1.3. Impacted is the function registerTools of the file src/tools.ts of the component new_heim_application/deploy_heim_application/deploy_heim_application_to_cloud. This manipulation causes os command injection. The attack requires local access. The exploit has been publicly disclosed and may be utilized. Patch name: c321d8af25f77668781e6ccb43a1336f9185df37. It is suggested to install a patch to address this issue. The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-05
Last Modified
2026-04-29
Generated
2026-05-06
AI Q&A
2026-04-06
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
nor2-io heim-mcp to 0.1.3 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-77 The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.
CWE-78 The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the Nor2-io heim-mcp software up to version 0.1.3, specifically in the function registerTools within the file src/tools.ts of the component new_heim_application/deploy_heim_application/deploy_heim_application_to_cloud.

The issue is an OS command injection vulnerability, meaning that an attacker with local access can manipulate the system to execute arbitrary operating system commands.

The vulnerability has been publicly disclosed and a patch is available to fix it.


How can this vulnerability impact me? :

If exploited, this vulnerability allows an attacker with local access to execute arbitrary OS commands on the affected system.

This could lead to unauthorized actions such as modifying system files, escalating privileges, or disrupting normal operations.

The impact depends on the privileges of the attacker and the context in which the vulnerable function is used.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, it is suggested to install the patch identified by commit c321d8af25f77668781e6ccb43a1336f9185df37 which fixes the issue.

Additionally, since the vulnerability requires local access and involves OS command injection in the registerTools function, restricting local access and applying the vendor's fixed version of the product are recommended immediate steps.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart