🚨 BREAKING

Critical RCE Flaw in radare2-mcp: Command Injection via JSON-RPC

Critical RCE Flaw in radare2-mcp: Command Injection via JSON-RPC

The National Vulnerability Database has disclosed CVE-2026-6942, a critical OS command injection vulnerability affecting radare2-mcp versions 1.6.0 and earlier. Attackers can exploit this flaw by injecting shell metacharacters through the JSON-RPC interface. This bypasses existing command filters, enabling remote attackers to execute arbitrary commands on the host system without any authentication.

The vulnerability carries a CVSS score of 9.8 (CRITICAL), highlighting its severe impact. Exploitation is straightforward due to the lack of authentication and the direct nature of command injection. This means an unauthenticated attacker could gain full control over a system running a vulnerable instance of radare2-mcp.

What This Means For You

  • If your organization uses radare2-mcp, immediately verify if your version is 1.6.0 or earlier. If so, patch to the latest version or isolate the affected system from untrusted networks. Audit network traffic to the JSON-RPC interface for any suspicious commands containing shell metacharacters.
🛡️ Am I exposed to this? Get detection rules for CVE-2026-6942 — Splunk, Sentinel, Elastic, QRadar & more

Related ATT&CK Techniques

🛡️ Detection Rules

3 rules · 6 SIEM formats

3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.

critical T1190 Initial Access

CVE-2026-6942 - radare2-mcp JSON-RPC Command Injection

Sigma YAML — free preview
✓ Sigma · Splunk SPL Sentinel KQL Elastic QRadar AQL Wazuh Get rules for your SIEM →

Indicators of Compromise

IDTypeIndicator
CVE-2026-6942 Command Injection radare2-mcp version 1.6.0 and earlier
CVE-2026-6942 RCE os command injection vulnerability in r2_cmd_str()
CVE-2026-6942 Command Injection Bypassing command filter through shell metacharacters in user-controlled input
CVE-2026-6942 RCE Injection through jsonrpc interface parameters
Source & Attribution
Source PlatformNVD
ChannelNational Vulnerability Database
PublishedApril 24, 2026 at 00:16 UTC

This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.

Believe this infringes your rights? Submit a takedown request.

Related Posts

OpenShell Mirror Mode Allows Arbitrary Code Execution

CVE-2026-41355 — OpenShell before 2026.3.28 contains an arbitrary code execution vulnerability in mirror mode that converts untrusted sandbox files into workspace hooks. Attackers with mirror...

vulnerabilityCVEhigh-severitycode-executioncwe-829
/SCW Vulnerability Desk /HIGH /7.3 /⚑ 4 IOCs /⚙ 3 Sigma

OpenClaw: High-Severity Access Control Bypass Looms

CVE-2026-41353 — OpenClaw before 2026.3.22 contains an access control bypass vulnerability in the allowProfiles feature that allows attackers to circumvent profile restrictions through persistent profile...

vulnerabilityCVEhigh-severitycwe-472
/SCW Vulnerability Desk /HIGH /8.1 /⚑ 4 IOCs /⚙ 2 Sigma

OpenClaw RCE: Paired Nodes Bypass Auth, Allow Arbitrary Commands

CVE-2026-41352 — OpenClaw before 2026.3.31 contains a remote code execution vulnerability where a device-paired node can bypass the node scope gate authentication mechanism. Attackers with...

vulnerabilityCVEhigh-severityremote-code-executioncwe-862
/SCW Vulnerability Desk /HIGH /8.8 /⚑ 3 IOCs /⚙ 3 Sigma