๐Ÿ” CVE Alert

CVE-2026-6942

CRITICAL 9.8

radare2-mcp <=1.6.0 OS Command Injection via Shell Metacharacter Bypass

CVSS Score
9.8
EPSS Score
0.0%
EPSS Percentile
0th

radare2-mcp version 1.6.0 and earlier contains an os command injection vulnerability that allows remote attackers to execute arbitrary commands by bypassing the command filter through shell metacharacters in user-controlled input passed to r2_cmd_str(). Attackers can inject shell metacharacters through the jsonrpc interface parameters to achieve remote code execution on the host running radare2-mcp without requiring authentication.

CWE CWE-78
Vendor radareorg
Product radare2
Published Apr 23, 2026
Stay Ahead of the Next One

Get instant alerts for radareorg radare2

Be the first to know when new critical vulnerabilities affecting radareorg radare2 are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Affected Versions

radareorg / radare2
0 < 1.6.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/radareorg/radare2-mcp/issues/45 github.com: https://github.com/radareorg/radare2-mcp/commit/482cde6500009112a8bc0b3fa8d2ef6180581ec0 vulncheck.com: https://www.vulncheck.com/advisories/radare2-mcp-os-command-injection-via-shell-metacharacter-bypass

Credits

Manthan Ghasadiya