๐Ÿ” CVE Alert

CVE-2026-7058

HIGH 7.3

666ghj MiroFish Inter-Process Communication simulation_ipc.py SimulationIPCClient.send_command command injection

CVSS Score
7.3
EPSS Score
0.0%
EPSS Percentile
0th

A vulnerability has been found in 666ghj MiroFish up to 0.1.2. The impacted element is the function SimulationIPCClient.send_command of the file backend/app/services/simulation_ipc.py of the component Inter-Process Communication. Such manipulation leads to command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The project was informed of the problem early through an issue report but has not responded yet.

CWE CWE-77 CWE-74
Vendor 666ghj
Product mirofish
Published Apr 26, 2026
Stay Ahead of the Next One

Get instant alerts for 666ghj mirofish

Be the first to know when new high vulnerabilities affecting 666ghj mirofish are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

666ghj / MiroFish
0.1.0 0.1.1 0.1.2

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
vuldb.com: https://vuldb.com/vuln/359631 vuldb.com: https://vuldb.com/vuln/359631/cti vuldb.com: https://vuldb.com/submit/798603 github.com: https://github.com/666ghj/MiroFish/issues/488 github.com: https://github.com/666ghj/MiroFish/

Credits

๐Ÿ” York Shen (VulDB User) VulDB CNA Team