CVE-2026-7058
666ghj MiroFish Inter-Process Communication simulation_ipc.py SimulationIPCClient.send_command command injection
CVSS Score
7.3
EPSS Score
0.0%
EPSS Percentile
0th
A vulnerability has been found in 666ghj MiroFish up to 0.1.2. The impacted element is the function SimulationIPCClient.send_command of the file backend/app/services/simulation_ipc.py of the component Inter-Process Communication. Such manipulation leads to command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The project was informed of the problem early through an issue report but has not responded yet.
| CWE | CWE-77 CWE-74 |
| Vendor | 666ghj |
| Product | mirofish |
| Published | Apr 26, 2026 |
Stay Ahead of the Next One
Get instant alerts for 666ghj mirofish
Be the first to know when new high vulnerabilities affecting 666ghj mirofish are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Affected Versions
666ghj / MiroFish
0.1.0 0.1.1 0.1.2
References
Credits
๐ York Shen (VulDB User) VulDB CNA Team