CVE-2026-6942
radare2-mcp <=1.6.0 OS Command Injection via Shell Metacharacter Bypass
CVSS Score
9.8
EPSS Score
0.0%
EPSS Percentile
0th
radare2-mcp version 1.6.0 and earlier contains an os command injection vulnerability that allows remote attackers to execute arbitrary commands by bypassing the command filter through shell metacharacters in user-controlled input passed to r2_cmd_str(). Attackers can inject shell metacharacters through the jsonrpc interface parameters to achieve remote code execution on the host running radare2-mcp without requiring authentication.
| CWE | CWE-78 |
| Vendor | radareorg |
| Product | radare2 |
| Published | Apr 23, 2026 |
Stay Ahead of the Next One
Get instant alerts for radareorg radare2
Be the first to know when new critical vulnerabilities affecting radareorg radare2 are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Affected Versions
radareorg / radare2
0 < 1.6.0
References
Credits
Manthan Ghasadiya