{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-20T19:16:16.964","vulnerabilities":[{"cve":{"id":"CVE-2026-25546","sourceIdentifier":"security-advisories@github.com","published":"2026-02-04T22:16:00.667","lastModified":"2026-03-18T14:25:39.043","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Godot MCP is a Model Context Protocol (MCP) server for interacting with the Godot game engine. Prior to version 0.1.1, a command injection vulnerability in godot-mcp allows remote code execution. The executeOperation function passed user-controlled input (e.g., projectPath) directly to exec(), which spawns a shell. An attacker could inject shell metacharacters like $(command) or &calc to execute arbitrary commands with the privileges of the MCP server process. This affects any tool that accepts projectPath, including create_scene, add_node, load_sprite, and others. This issue has been patched in version 0.1.1."},{"lang":"es","value":"Godot MCP es un servidor de Model Context Protocol (MCP) para interactuar con el motor de juego Godot. Antes de la versión 0.1.1, una vulnerabilidad de inyección de comandos en godot-mcp permite la ejecución remota de código. La función executeOperation pasaba la entrada controlada por el usuario (p. ej., projectPath) directamente a exec(), lo que genera un shell. Un atacante podría inyectar metacaracteres de shell como $(command) o &amp;calc para ejecutar comandos arbitrarios con los privilegios del proceso del servidor MCP. Esto afecta a cualquier herramienta que acepte projectPath, incluyendo create_scene, add_node, load_sprite y otras. Este problema ha sido parcheado en la versión 0.1.1."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Primary","description":[{"lang":"en","value":"CWE-78"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:coding-solo:godot_mcp:*:*:*:*:*:*:*:*","versionEndExcluding":"0.1.1","matchCriteriaId":"0CC0EB90-7310-48CF-951B-E59AAD1BAABC"}]}]}],"references":[{"url":"https://github.com/Coding-Solo/godot-mcp/commit/21c785d923cfdb471ea60323c13807d62dfecc5a","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/Coding-Solo/godot-mcp/issues/64","source":"security-advisories@github.com","tags":["Issue Tracking"]},{"url":"https://github.com/Coding-Solo/godot-mcp/pull/67","source":"security-advisories@github.com","tags":["Issue Tracking","Patch"]},{"url":"https://github.com/Coding-Solo/godot-mcp/security/advisories/GHSA-8jx2-rhfh-q928","source":"security-advisories@github.com","tags":["Vendor Advisory"]}]}}]}