๐Ÿ” CVE Alert

CVE-2026-5802

HIGH 7.3

idachev mcp-javadc HTTP os command injection

CVSS Score
7.3
EPSS Score
0.8%
EPSS Percentile
75th

A vulnerability was identified in idachev mcp-javadc up to 1.2.4. Impacted is an unknown function of the component HTTP Interface. Such manipulation of the argument jarFilePath leads to os command injection. It is possible to launch the attack remotely. The exploit is publicly available and might be used. The project was informed of the problem early through an issue report but has not responded yet.

CWE CWE-78 CWE-77
Vendor idachev
Product mcp-javadc
Published Apr 8, 2026
Last Updated Apr 10, 2026
Stay Ahead of the Next One

Get instant alerts for idachev mcp-javadc

Be the first to know when new high vulnerabilities affecting idachev mcp-javadc are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

idachev / mcp-javadc
1.2.0 1.2.1 1.2.2 1.2.3 1.2.4

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
vuldb.com: https://vuldb.com/vuln/356241 vuldb.com: https://vuldb.com/vuln/356241/cti vuldb.com: https://vuldb.com/submit/786974 github.com: https://github.com/idachev/mcp-javadc/issues/7 github.com: https://github.com/BruceJqs/public_exp/issues/2 github.com: https://github.com/idachev/mcp-javadc/

Credits

๐Ÿ” BruceJin (VulDB User) VulDB CNA Team