{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T11:03:44.870","vulnerabilities":[{"cve":{"id":"CVE-2026-27203","sourceIdentifier":"security-advisories@github.com","published":"2026-02-21T00:16:17.463","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"eBay API MCP Server is an open source local MCP server providing AI assistants with comprehensive access to eBay's Sell APIs. All versions are vulnerable to Environment Variable Injection through the updateEnvFile function. The ebay_set_user_tokens tool allows updating the .env file with new tokens. The updateEnvFile function in src/auth/oauth.ts blindly appends or replaces values without validating them for newlines or quotes. This allows an attacker to inject arbitrary environment variables into the configuration file. An attacker can inject arbitrary environment variables into the .env file. This could lead to configuration overwrites, Denial of Service, and potential RCE. There was no fix for this issue at the time of publication."},{"lang":"es","value":"eBay API MCP Server es un servidor MCP local de código abierto que proporciona a los asistentes de IA acceso completo a las API de venta de eBay. Todas las versiones son vulnerables a la Inyección de Variables de Entorno a través de la función updateEnvFile. La herramienta ebay_set_user_tokens permite actualizar el archivo .env con nuevos tokens. La función updateEnvFile en src/auth/oauth.ts añade o reemplaza valores ciegamente sin validarlos en busca de saltos de línea o comillas. Esto permite a un atacante inyectar variables de entorno arbitrarias en el archivo de configuración. Un atacante puede inyectar variables de entorno arbitrarias en el archivo .env. Esto podría llevar a sobrescrituras de configuración, Denegación de Servicio y potencial RCE. No había una solución para este problema en el momento de la publicación."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H","baseScore":8.3,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.5}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Primary","description":[{"lang":"en","value":"CWE-15"},{"lang":"en","value":"CWE-74"}]}],"references":[{"url":"https://github.com/YosefHayim/ebay-mcp/commit/aab0bda75ea9dd27aa37d0d8524d7cf41b3c4a9a","source":"security-advisories@github.com"},{"url":"https://github.com/YosefHayim/ebay-mcp/security/advisories/GHSA-97rm-xj73-33jh","source":"security-advisories@github.com"}]}}]}