CVE-2026-7038
Received Received - Intake
Insufficiently Protected Credentials in tufantunc ssh-mcp CLI Handler

Publication date: 2026-04-26

Last updated on: 2026-04-26

Assigner: VulDB

Description
A weakness has been identified in tufantunc ssh-mcp up to 1.5.0. Impacted is an unknown function of the file src/index.ts of the component Command Line Handler. This manipulation causes insufficiently protected credentials. The attack is restricted to local execution. The exploit has been made available to the public and could be used for attacks. The project was informed of the problem early through an issue report but has not responded yet.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-26
Last Modified
2026-04-26
Generated
2026-05-07
AI Q&A
2026-04-26
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
tufantunc ssh-mcp 1.5.0
tufantunc ssh-mcp to 1.5.0 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-522 The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

The vulnerability in tufantunc ssh-mcp up to version 1.5.0 involves insecure handling of SSH credentials. Specifically, passwords for SSH login, sudo, and su are passed as command-line arguments when starting the ssh-mcp service. Because on Linux systems process command-line arguments are accessible to any local user through commands like 'ps aux' or by reading the '/proc/<pid>/cmdline' file, an unprivileged local attacker can easily retrieve these plaintext passwords.

This exposure happens in the Command Line Handler component, particularly in the 'src/index.ts' file where these password arguments are parsed and used. The vulnerability allows local attackers to obtain sensitive credentials directly from the running process, violating secure secret management principles.


How can this vulnerability impact me? :

This vulnerability can lead to credential leakage of SSH, sudo, and su passwords to any local user on the affected system. An attacker with local access can retrieve these plaintext passwords from the process command line, potentially allowing unauthorized access to SSH sessions, privilege escalation via sudo, or persistent root access via su.

Such credential exposure increases the risk of unauthorized system access, data compromise, and further attacks within the environment. Since the exploit requires local access, remote attackers cannot directly exploit it without first gaining local presence.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by checking if the ssh-mcp process is running with passwords passed as command-line arguments, which exposes them to local users.

You can identify the process ID of ssh-mcp using commands like:

  • pgrep -f ssh-mcp

Then, inspect the full command line of the process to see if sensitive passwords are visible:

  • ps -fp <pid>
  • cat /proc/<pid>/cmdline | tr '\0' ' '

If passwords appear in the command line arguments (e.g., --password=, --sudoPassword=, --suPassword=), the vulnerability is present.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability immediately, avoid passing sensitive credentials such as SSH, sudo, and su passwords via command-line arguments when starting the ssh-mcp service.

Instead, use more secure methods of credential management that do not expose passwords in process listings or procfs.

Restrict local user access to the system to prevent unauthorized users from viewing process command lines.

Monitor and audit running processes regularly to detect any exposure of credentials.

Consider disabling or limiting the use of password-based authentication in favor of SSH key authentication where possible.

Stay updated with the ssh-mcp project for any patches or official fixes addressing this issue.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability in ssh-mcp exposes SSH, sudo, and su passwords in plaintext to any local user by passing them as command-line arguments, which can be viewed through standard process inspection tools. This insecure handling of sensitive credentials violates secure secret management principles.

Such exposure of credentials can lead to unauthorized access and potential data breaches, which may result in non-compliance with common security standards and regulations like GDPR and HIPAA that require protection of sensitive information and credentials.

Because the vulnerability allows local attackers to retrieve plaintext passwords, it undermines confidentiality controls and could lead to violations of regulatory requirements for protecting access credentials and preventing unauthorized access to systems and data.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart