CVE-2026-30861

CRITICAL LAB

WeKnora 0.2.5-0.2.10 - RCE

Title source: llm

Description

WeKnora is an LLM-powered framework designed for deep document understanding and semantic retrieval. From version 0.2.5 to before version 0.2.10, an unauthenticated remote code execution (RCE) vulnerability exists in the MCP stdio configuration validation. The application allows unrestricted user registration, meaning any attacker can create an account and exploit the command injection flaw. Despite implementing a whitelist for allowed commands (npx, uvx) and blacklists for dangerous arguments and environment variables, the validation can be bypassed using the -p flag with npx node. This allows any attacker to execute arbitrary commands with the application's privileges, leading to complete system compromise. This issue has been patched in version 0.2.10.

Exploits (1)

github WORKING POC 1 stars
by exploitintel · cpoc
https://github.com/exploitintel/eip-pocs-and-cves/tree/main/CVE-2026-30861

Scores

CVSS v3 9.9
EPSS 0.0021
EPSS Percentile 43.1%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

Lab Environment

Lab screenshot
vulnerable
docker pull ghcr.io/exploitintel/cve-2026-30861-vulnerable:latest
All Labs GitHub

Classification

CWE
CWE-78
Status draft

Affected Products (1)

Tencent/WeKnora < 0.2.10Go

Timeline

Published Mar 07, 2026
Tracked Since Mar 08, 2026