New Chatbox AI Flaw: Remote OS Command Injection
A critical vulnerability, tracked as CVE-2026-6130, has been identified in chatboxai chatbox versions up to 1.20.0. According to the National Vulnerability Database, this flaw resides within the StdioClientTransport function in the src/main/mcp/ipc-stdio-transport.ts file, a component of the Model Context Protocol Server Management System.
The vulnerability is an OS command injection, categorized under CWE-77 and CWE-78, which can be triggered by manipulating the args/env argument. What’s concerning is that this attack can be launched remotely, and an exploit has already been published, meaning it’s likely already in the wild or will be soon. The National Vulnerability Database noted that the project developers were informed via an issue report but have not yet responded, leaving users in a precarious position with an unpatched, exploitable flaw.
Related ATT&CK Techniques
🛡️ Detection Rules
4 rules · 5 SIEM formats4 auto-generated detection rules for this incident, mapped to MITRE ATT&CK. Available in Sigma, Splunk SPL, Sentinel KQL, Elastic Lucene, and QRadar AQL.
Web Application Exploitation Attempt — CVE-2026-6130
Get this rule in your SIEM's native format — copy, paste, detect. No manual conversion.
4 Sigma rules mapped to the ATT&CK techniques from this breach — pick your SIEM and get a ready-to-paste query.
Get Detection Rules →Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-6130 | Command Injection | chatboxai chatbox up to version 1.20.0 |
| CVE-2026-6130 | Command Injection | Vulnerable component: Model Context Protocol Server Management System |
| CVE-2026-6130 | Command Injection | Vulnerable function: StdioClientTransport in src/main/mcp/ipc-stdio-transport.ts |
| CVE-2026-6130 | Command Injection | Manipulation of argument 'args/env' leads to OS command injection |