CVE-2026-7061
Received Received - Intake
OS Command Injection in Toowiredd MCP/HTTP Docker Service

Publication date: 2026-04-26

Last updated on: 2026-04-29

Assigner: VulDB

Description
A weakness has been identified in Toowiredd chatgpt-mcp-server up to 0.1.0. Affected by this issue is some unknown functionality of the file src/services/docker.service.ts of the component MCP/HTTP. This manipulation causes os command injection. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be used for attacks. The project was informed of the problem early through an issue report but has not responded yet.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-26
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2026-04-27
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
toowiredd chatgpt-mcp-server to 0.1.0 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-77 The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.
CWE-78 The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a weakness in the Toowiredd chatgpt-mcp-server up to version 0.1.0, specifically in the file src/services/docker.service.ts within the MCP/HTTP component. It allows an attacker to perform OS command injection, meaning they can execute arbitrary operating system commands on the affected system.

The vulnerability can be exploited remotely, and the exploit code has been made publicly available.


How can this vulnerability impact me? :

This vulnerability can have serious impacts as it allows remote attackers to execute arbitrary OS commands on the affected server without any authentication or user interaction.

Such exploitation can lead to unauthorized access, data compromise, system manipulation, or disruption of services.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart