CVE-2026-5602
OS Command Injection in Nor2-io heim-mcp registerTools Function
Publication date: 2026-04-05
Last updated on: 2026-04-29
Assigner: VulDB
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| nor2-io | heim-mcp | to 0.1.3 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-77 | The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component. |
| CWE-78 | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Nor2-io heim-mcp software up to version 0.1.3, specifically in the function registerTools within the file src/tools.ts of the component new_heim_application/deploy_heim_application/deploy_heim_application_to_cloud.
The issue is an OS command injection vulnerability, meaning that an attacker with local access can manipulate the system to execute arbitrary operating system commands.
The vulnerability has been publicly disclosed and a patch is available to fix it.
How can this vulnerability impact me? :
If exploited, this vulnerability allows an attacker with local access to execute arbitrary OS commands on the affected system.
This could lead to unauthorized actions such as modifying system files, escalating privileges, or disrupting normal operations.
The impact depends on the privileges of the attacker and the context in which the vulnerable function is used.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, it is suggested to install the patch identified by commit c321d8af25f77668781e6ccb43a1336f9185df37 which fixes the issue.
Additionally, since the vulnerability requires local access and involves OS command injection in the registerTools function, restricting local access and applying the vendor's fixed version of the product are recommended immediate steps.