๐Ÿ” CVE Alert

CVE-2026-5603

MEDIUM 5.3

elgentos magento2-dev-mcp index.ts executeMagerun2Command os command injection

CVSS Score
5.3
EPSS Score
0.1%
EPSS Percentile
18th

A vulnerability was identified in elgentos magento2-dev-mcp up to 1.0.2. The affected element is the function executeMagerun2Command of the file src/index.ts. Such manipulation leads to os command injection. An attack has to be approached locally. The exploit is publicly available and might be used. The name of the patch is aa1ffcc0aea1b212c69787391783af27df15ae9d. A patch should be applied to remediate this issue.

CWE CWE-78 CWE-77
Vendor elgentos
Product magento2-dev-mcp
Published Apr 5, 2026
Last Updated Apr 6, 2026
Stay Ahead of the Next One

Get instant alerts for elgentos magento2-dev-mcp

Be the first to know when new medium vulnerabilities affecting elgentos magento2-dev-mcp are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

elgentos / magento2-dev-mcp
1.0.0 1.0.1 1.0.2

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
vuldb.com: https://vuldb.com/vuln/355395 vuldb.com: https://vuldb.com/vuln/355395/cti vuldb.com: https://vuldb.com/submit/784864 github.com: https://github.com/elgentos/magento2-dev-mcp/issues/4 github.com: https://github.com/elgentos/magento2-dev-mcp/pull/5 github.com: https://github.com/user-attachments/files/25895777/magento2-dev-mcp_bug.pdf github.com: https://github.com/elgentos/magento2-dev-mcp/commit/aa1ffcc0aea1b212c69787391783af27df15ae9d github.com: https://github.com/elgentos/magento2-dev-mcp/

Credits

๐Ÿ” Yinci Chen (VulDB User)