CVE-2026-7061: Toowiredd chatgpt-mcp-server Vulnerable to OS Command Injection
The National Vulnerability Database has identified CVE-2026-7061, a high-severity OS command injection vulnerability (CVSS 7.3) affecting Toowiredd chatgpt-mcp-server up to version 0.1.0. The flaw resides within an unspecified function of the src/services/docker.service.ts file, part of the MCP/HTTP component. This isn’t theoretical; remote exploitation is possible, and a public exploit is already available, meaning attackers can weaponize this immediately.
This vulnerability is a classic CWE-77/CWE-78, where improper neutralization of special elements in commands or arguments allows arbitrary command execution. The project maintainers were notified via an issue report but have not yet responded, leaving users exposed to active threats. The lack of a patch, coupled with public exploit availability, puts any organization running this server at significant risk.
Attackers will leverage this to gain initial access, execute arbitrary code, and likely establish persistence or move laterally within compromised environments. Given the nature of command injection, the potential impact on confidentiality, integrity, and availability is substantial, particularly if the server runs with elevated privileges or has access to sensitive data or network segments.
What This Means For You
- If your organization is running Toowiredd chatgpt-mcp-server, particularly versions up to 0.1.0, you are directly exposed to CVE-2026-7061. This is a critical vulnerability with a public exploit. Shut down or isolate these instances immediately until a patch becomes available. Audit your systems for any unauthorized access or command execution if you've been running this server.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CVE-2026-7061: Toowiredd chatgpt-mcp-server OS Command Injection via docker.service.ts
title: CVE-2026-7061: Toowiredd chatgpt-mcp-server OS Command Injection via docker.service.ts
id: scw-2026-04-26-ai-1
status: experimental
level: critical
description: |
Detects attempts to exploit CVE-2026-7061 by targeting the docker.service.ts endpoint in Toowiredd chatgpt-mcp-server. The rule looks for common command injection characters within the URI query parameters, indicating an attempt to inject OS commands.
author: SCW Feed Engine (AI-generated)
date: 2026-04-26
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-7061/
tags:
- attack.initial_access
- attack.t1190
logsource:
category: webserver
detection:
selection:
cs-uri|contains:
- '/docker.service.ts'
cs-uri-query|contains:
- '&&'
- ';'
- '|'
- '`'
- '$()'
condition: selection
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-7061 | Command Injection | Toowiredd chatgpt-mcp-server up to 0.1.0 |
| CVE-2026-7061 | Command Injection | Vulnerable file: src/services/docker.service.ts |
| CVE-2026-7061 | Command Injection | Vulnerable component: MCP/HTTP |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | April 27, 2026 at 01:17 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.