๐Ÿ” CVE Alert

CVE-2026-7220

HIGH 7.3

jackwrichards FastlyMCP fastly_cli Tool fastly-mcp.mjs os command injection

CVSS Score
7.3
EPSS Score
0.0%
EPSS Percentile
0th

A vulnerability has been found in jackwrichards FastlyMCP up to 6f3d0b0e654fc51076badc7fa16c03c461f95620. This impacts an unknown function of the file fastly-mcp.mjs of the component fastly_cli Tool. The manipulation of the argument command leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available. The project was informed of the problem early through an issue report but has not responded yet.

CWE CWE-78 CWE-77
Vendor jackwrichards
Product fastlymcp
Published Apr 28, 2026
Stay Ahead of the Next One

Get instant alerts for jackwrichards fastlymcp

Be the first to know when new high vulnerabilities affecting jackwrichards fastlymcp are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

jackwrichards / FastlyMCP
6f3d0b0e654fc51076badc7fa16c03c461f95620

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
vuldb.com: https://vuldb.com/vuln/359820 vuldb.com: https://vuldb.com/vuln/359820/cti vuldb.com: https://vuldb.com/submit/802138 github.com: https://github.com/jackwrichards/FastlyMCP/issues/3 github.com: https://github.com/jackwrichards/FastlyMCP/

Credits

๐Ÿ” CPT_Penner (VulDB User) VulDB CNA Team