CVE-2026-7064: AgentDeskAI Browser Tool Suffers OS Command Injection

CVE-2026-7064: AgentDeskAI Browser Tool Suffers OS Command Injection

A critical vulnerability, CVE-2026-7064, has been identified in AgentDeskAI browser-tools-mcp up to version 1.2.0. This flaw, detailed by the National Vulnerability Database, allows for remote operating system command injection through an unspecified processing issue within the browser-tools-server/browser-connector.ts file. The CVSS score of 7.3 (HIGH) underscores the severity, with a vector indicating network-based attacks requiring no privileges or user interaction.

The National Vulnerability Database highlights that an exploit for CVE-2026-7064 has been publicly released, drastically increasing the immediate risk. This means attackers don’t need to develop their own methods; they can leverage existing code to compromise affected systems. The project maintainers were reportedly notified of the issue but have not yet responded, leaving users exposed.

This vulnerability, categorized under CWE-77 (Improper Neutralization of Special Elements used in a Command) and CWE-78 (Improper Neutralization of Special Elements used in an OS Command), represents a direct path to system compromise. Defenders must recognize that the ease of exploitation and public availability of exploit code make this a prime target for opportunistic attackers. Given the lack of a patch, immediate mitigation strategies are paramount.

What This Means For You

  • If your organization uses AgentDeskAI browser-tools-mcp, you are directly exposed to remote OS command injection via CVE-2026-7064. Since an exploit is public and no patch exists, you must assume active exploitation is possible. Isolate or disable affected instances immediately. Audit network traffic for suspicious outbound connections from systems running this tool.

Related ATT&CK Techniques

🛡️ Detection Rules

5 rules · 6 SIEM formats

5 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.

high T1190 Initial Access

Web Application Exploitation Attempt — CVE-2026-7064

Sigma YAML — free preview
title: Web Application Exploitation Attempt — CVE-2026-7064
id: scw-2026-04-26-1
status: experimental
level: high
description: |
  Detects common exploitation patterns targeting web applications. Review CVE-2026-7064 advisories for specific indicators.
author: SCW Feed Engine (auto-generated)
date: 2026-04-26
references:
  - https://shimiscyberworld.com/posts/nvd-CVE-2026-7064/
tags:
  - attack.initial_access
  - attack.t1190
logsource:
    category: webserver
detection:
  selection:
      cs-uri-query|contains:
        - '..'
        - 'SELECT'
        - 'UNION'
        - '<script'
        - 'cmd='
        - '/etc/passwd'
      condition: selection
falsepositives:
  - Legitimate activity from CVE-2026-7064

Source: Shimi's Cyber World · License & reuse

✓ Sigma · Splunk SPL Sentinel KQL Elastic QRadar AQL Wazuh Get rules for your SIEM →

Indicators of Compromise

IDTypeIndicator
CVE-2026-7064 Command Injection AgentDeskAI browser-tools-mcp up to version 1.2.0
CVE-2026-7064 Command Injection Vulnerable file: browser-tools-server/browser-connector.ts
CVE-2026-7064 Command Injection Attack vector: Remote OS Command Injection
Source & Attribution
Source PlatformNVD
ChannelNational Vulnerability Database
PublishedApril 27, 2026 at 02:16 UTC

This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.

Believe this infringes your rights? Submit a takedown request.

Related coverage

itsourcecode Construction Management System SQLi: CVE-2026-7073

CVE-2026-7073 — A flaw has been found in itsourcecode Construction Management System 1.0. This affects an unknown part of the file /execute.php. This manipulation of...

vulnerabilityCVEhigh-severitysql-injectioncwe-74cwe-89
/SCW Vulnerability Desk /HIGH /7.3 /⚑ 3 IOCs /⚙ 3 Sigma

CVE-2026-7072: CodePanda Source Canteen Management System SQLi

CVE-2026-7072 — A vulnerability was detected in CodePanda Source canteen_management_system 1.0. Affected by this issue is some unknown functionality of the file /api/login.php. The manipulation...

vulnerabilityCVEhigh-severitysql-injectioncwe-74cwe-89
/SCW Vulnerability Desk /HIGH /7.3 /⚑ 3 IOCs /⚙ 3 Sigma

CVE-2026-7071 — CodeAstro Online Job Portal Vulnerability

CVE-2026-7071 — A security vulnerability has been detected in CodeAstro Online Job Portal 1.0. Affected by this vulnerability is an unknown functionality of the file...

vulnerabilityCVEmedium-severitycwe-200cwe-538
/SCW Vulnerability Desk /MEDIUM /5.3 /⚑ 3 IOCs /⚙ 2 Sigma