CVE-2026-7730
privsim mcp-test-runner MCP index.ts child_process.spawn os command injection
CVSS Score
6.3
EPSS Score
0.0%
EPSS Percentile
0th
A weakness has been identified in privsim mcp-test-runner 0.2.0. Impacted is the function child_process.spawn of the file src/index.ts of the component MCP Interface. Executing a manipulation of the argument command can lead to os command injection. The attack may be launched remotely. The exploit has been made available to the public and could be used for attacks. The project was informed of the problem early through an issue report but has not responded yet.
| CWE | CWE-78 CWE-77 |
| Vendor | privsim |
| Product | mcp-test-runner |
| Published | May 4, 2026 |
Stay Ahead of the Next One
Get instant alerts for privsim mcp-test-runner
Be the first to know when new medium vulnerabilities affecting privsim mcp-test-runner are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Affected Versions
privsim / mcp-test-runner
0.2.0
References
vuldb.com: https://vuldb.com/vuln/360905 vuldb.com: https://vuldb.com/vuln/360905/cti vuldb.com: https://vuldb.com/submit/807541 github.com: https://github.com/privsim/mcp-test-runner/issues/24 github.com: https://github.com/BruceJqs/public_exp/issues/37 github.com: https://github.com/privsim/mcp-test-runner/
Credits
๐ BruceJqs (VulDB User) VulDB CNA Team