CVE-2026-7446: VetCoders mcp-server-semgrep OS Command Injection
The National Vulnerability Database (NVD) has disclosed CVE-2026-7446, a high-severity OS command injection vulnerability in VetCoders mcp-server-semgrep version 1.0.0. This critical flaw resides within the MCP Interface component, specifically affecting functions like analyze_results, filter_results, export_results, compare_results, scan_directory, and create_rule in the src/index.ts file.
Attackers can exploit this by manipulating the ID argument, leading to remote operating system command injection. The NVD warns that an exploit for this vulnerability is now public, significantly increasing the immediate risk for unpatched systems. This isn’t theoretical; it’s a direct path to system compromise.
With a CVSS score of 7.3 (HIGH) and a vector indicating network-based attacks requiring no privileges or user interaction, this vulnerability is easily exploitable. The NVD recommends upgrading to version 1.0.1, which includes patch 141335da044e53c3f5b315e0386e01238405b771, to mitigate the issue.
What This Means For You
- If your organization uses VetCoders mcp-server-semgrep 1.0.0, you are directly exposed to remote OS command injection. This isn't a theoretical risk; public exploits are out there. Patch to version 1.0.1 immediately. Failure to do so means an attacker could execute arbitrary commands on your server, leading to data exfiltration, service disruption, or full system takeover.
Related ATT&CK Techniques
🛡️ Detection Rules
2 rules · 6 SIEM formats2 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CVE-2026-7446: VetCoders mcp-server-semgrep OS Command Injection via ID parameter
title: CVE-2026-7446: VetCoders mcp-server-semgrep OS Command Injection via ID parameter
id: scw-2026-04-30-ai-1
status: experimental
level: critical
description: |
Detects exploitation attempts against CVE-2026-7446 in VetCoders mcp-server-semgrep. The vulnerability allows OS command injection when the 'ID' parameter is manipulated in specific API endpoints. This rule looks for requests targeting these endpoints with the 'id=' parameter, indicating a potential exploit attempt.
author: SCW Feed Engine (AI-generated)
date: 2026-04-30
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-7446/
tags:
- attack.initial_access
- attack.t1190
logsource:
category: webserver
detection:
selection:
cs-uri|contains:
- '/analyze_results'
- '/filter_results'
- '/export_results'
- '/compare_results'
- '/scan_directory'
- '/create_rule'
cs-uri-query|contains:
- 'id='
condition: selection
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-7446 | Command Injection | VetCoders mcp-server-semgrep version 1.0.0 |
| CVE-2026-7446 | Command Injection | Vulnerable functions: analyze_results, filter_results, export_results, compare_results, scan_directory, create_rule in src/index.ts |
| CVE-2026-7446 | Command Injection | Manipulation of argument ID in MCP Interface component |
| CVE-2026-7446 | Command Injection | Upgrade to VetCoders mcp-server-semgrep version 1.0.1 or apply patch 141335da044e53c3f5b315e0386e01238405b771 |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | April 30, 2026 at 03:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.