CVE-2026-7629
MEDIUMkleneway awesome-cursor-mpc-server Ccode-Review Tool codeReview.ts runCodeReviewTool command injection
Title source: cnaDescription
A flaw has been found in kleneway awesome-cursor-mpc-server up to 2.0.1. Impacted is the function runCodeReviewTool of the file src/tools/codeReview.ts of the component Ccode-Review Tool. Executing a manipulation can lead to command injection. The attack may be launched remotely. The exploit has been published and may be used. The project was informed of the problem early through a pull request but has not reacted yet.
References (7)
Core 7
Core References
Vdb Entry, Technical Description vdb-entry
technical-description
VDB-360575 | kleneway awesome-cursor-mpc-server Ccode-Review Tool codeReview.ts runCodeReviewTool command injection
https://vuldb.com/vuln/360575
Signature, Permissions Required signature
permissions-required
VDB-360575 | CTI Indicators (IOB, IOC, TTP, IOA)
https://vuldb.com/vuln/360575/cti
Third Party Advisory third-party-advisory
Submit #806470 | kleneway awesome-cursor-mpc-server <=2.0.1 Command Injection
https://vuldb.com/submit/806470
Issue Tracking issue-tracking
https://github.com/kleneway/awesome-cursor-mpc-server/issues/6
Patch issue-tracking
patch
https://github.com/kleneway/awesome-cursor-mpc-server/pull/14
Exploit exploit
https://github.com/user-attachments/files/26019723/awesome-cursor-mpc-server_bug.pdf
Product product
https://github.com/kleneway/awesome-cursor-mpc-server/
Scores
CVSS v3
6.3
EPSS
0.0123
EPSS Percentile
79.4%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
partial
Details
CWE
CWE-74
CWE-77
Status
published
Products (2)
kleneway/awesome-cursor-mpc-server
2.0.0
kleneway/awesome-cursor-mpc-server
2.0.1
Published
May 02, 2026
Tracked Since
May 02, 2026