CVE-2026-25546

Source
https://cve.org/CVERecord?id=CVE-2026-25546
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-25546.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-25546
Aliases
Published
2026-02-04T21:48:53.225Z
Modified
2026-03-13T04:10:48.224011Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Godot MCP is vulnerable to Command Injection via unsanitized projectPath
Details

Godot MCP is a Model Context Protocol (MCP) server for interacting with the Godot game engine. Prior to version 0.1.1, a command injection vulnerability in godot-mcp allows remote code execution. The executeOperation function passed user-controlled input (e.g., projectPath) directly to exec(), which spawns a shell. An attacker could inject shell metacharacters like $(command) or &calc to execute arbitrary commands with the privileges of the MCP server process. This affects any tool that accepts projectPath, including createscene, addnode, load_sprite, and others. This issue has been patched in version 0.1.1.

Database specific
{
    "cna_assigner": "GitHub_M",
    "cwe_ids": [
        "CWE-78"
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/25xxx/CVE-2026-25546.json"
}
References

Affected packages

Git /

Affected ranges

Type
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
21c785d923cfdb471ea60323c13807d62dfecc5a

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-25546.json"