CVE-2026-7064: AgentDeskAI Browser Tool Suffers OS Command Injection
A critical vulnerability, CVE-2026-7064, has been identified in AgentDeskAI browser-tools-mcp up to version 1.2.0. This flaw, detailed by the National Vulnerability Database, allows for remote operating system command injection through an unspecified processing issue within the browser-tools-server/browser-connector.ts file. The CVSS score of 7.3 (HIGH) underscores the severity, with a vector indicating network-based attacks requiring no privileges or user interaction.
The National Vulnerability Database highlights that an exploit for CVE-2026-7064 has been publicly released, drastically increasing the immediate risk. This means attackers don’t need to develop their own methods; they can leverage existing code to compromise affected systems. The project maintainers were reportedly notified of the issue but have not yet responded, leaving users exposed.
This vulnerability, categorized under CWE-77 (Improper Neutralization of Special Elements used in a Command) and CWE-78 (Improper Neutralization of Special Elements used in an OS Command), represents a direct path to system compromise. Defenders must recognize that the ease of exploitation and public availability of exploit code make this a prime target for opportunistic attackers. Given the lack of a patch, immediate mitigation strategies are paramount.
What This Means For You
- If your organization uses AgentDeskAI browser-tools-mcp, you are directly exposed to remote OS command injection via CVE-2026-7064. Since an exploit is public and no patch exists, you must assume active exploitation is possible. Isolate or disable affected instances immediately. Audit network traffic for suspicious outbound connections from systems running this tool.
Related ATT&CK Techniques
🛡️ Detection Rules
5 rules · 6 SIEM formats5 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
Web Application Exploitation Attempt — CVE-2026-7064
title: Web Application Exploitation Attempt — CVE-2026-7064
id: scw-2026-04-26-1
status: experimental
level: high
description: |
Detects common exploitation patterns targeting web applications. Review CVE-2026-7064 advisories for specific indicators.
author: SCW Feed Engine (auto-generated)
date: 2026-04-26
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-7064/
tags:
- attack.initial_access
- attack.t1190
logsource:
category: webserver
detection:
selection:
cs-uri-query|contains:
- '..'
- 'SELECT'
- 'UNION'
- '<script'
- 'cmd='
- '/etc/passwd'
condition: selection
falsepositives:
- Legitimate activity from CVE-2026-7064
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-7064 | Command Injection | AgentDeskAI browser-tools-mcp up to version 1.2.0 |
| CVE-2026-7064 | Command Injection | Vulnerable file: browser-tools-server/browser-connector.ts |
| CVE-2026-7064 | Command Injection | Attack vector: Remote OS Command Injection |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | April 27, 2026 at 02:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.