CVE-2026-7316
Received Received - Intake
Command Injection in eiliyaabedini aider-mcp Remote Exploit

Publication date: 2026-04-28

Last updated on: 2026-04-29

Assigner: VulDB

Description
A vulnerability has been found in eiliyaabedini aider-mcp up to 667b914301aada695aab0e46d1fb3a7d5e32c8af. Affected is an unknown function of the file aider_mcp.py of the component code_with_ai. The manipulation of the argument working_dir/editable_files leads to command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. This product uses a rolling release model to deliver continuous updates. As a result, specific version information for affected or updated releases is not available. The project was informed of the problem early through an issue report but has not responded yet.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-28
Last Modified
2026-04-29
Generated
2026-05-06
AI Q&A
2026-04-29
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
eiliyaabedini aider_mcp to 667b914301aada695aab0e46d1fb3a7d5e32c8af (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-77 The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.
CWE-74 The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :

The vulnerability allows remote attackers to perform command injection, which can lead to unauthorized execution of commands on the affected system. This can compromise the confidentiality, integrity, and availability of the system, potentially allowing attackers to steal data, modify or delete information, or disrupt system operations.


Can you explain this vulnerability to me?

This vulnerability exists in the eiliyaabedini aider-mcp software, specifically in an unknown function within the aider_mcp.py file of the code_with_ai component. It involves the manipulation of the argument working_dir/editable_files, which leads to command injection. This means an attacker can execute arbitrary commands on the affected system by exploiting this flaw. The attack can be initiated remotely, making it potentially more dangerous.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart