CVE-2026-7812: Remote Command Injection in 54yyyu code-mcp MCP Tool
The National Vulnerability Database has disclosed CVE-2026-7812, a high-severity remote command injection vulnerability in 54yyyu code-mcp up to commit 4cfc4643541a110c906d93635b391bf7e357f4a8. The flaw resides in the git_operation function within the src/code_mcp/server.py file, specifically in the MCP Tool component. Attackers can trigger this vulnerability by manipulating the operation argument, leading to arbitrary command execution.
This vulnerability carries a CVSS score of 7.3 (HIGH) and is remotely exploitable with no authentication required. The exploit code is public, meaning this isn’t theoretical – it’s actively weaponizable. A major concern is that 54yyyu code-mcp uses continuous delivery, making it impossible to pinpoint specific affected or patched versions. The project was notified but has yet to respond, leaving users exposed.
This is a classic command injection scenario (CWE-74, CWE-77) that grants attackers significant control over the compromised system. Defenders need to recognize that public exploits for high-severity, unauthenticated remote vulnerabilities are prime targets for opportunistic attackers. The lack of versioning and developer responsiveness elevates the risk considerably.
What This Means For You
- If your organization uses 54yyyu code-mcp, you need to assess your exposure to CVE-2026-7812 immediately. Since no patch information is available, your immediate priority should be to identify any instances of this software in your environment and isolate or remove them. Assume compromise if you cannot confirm its absence or mitigation. This is a critical remote execution vector, and the public exploit means attackers are already looking for targets.
Related ATT&CK Techniques
🛡️ Detection Rules
5 rules · 6 SIEM formats5 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
Web Application Exploitation Attempt — CVE-2026-7812
title: Web Application Exploitation Attempt — CVE-2026-7812
id: scw-2026-05-05-1
status: experimental
level: high
description: |
Detects common exploitation patterns targeting web applications. Review CVE-2026-7812 advisories for specific indicators.
author: SCW Feed Engine (auto-generated)
date: 2026-05-05
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-7812/
tags:
- attack.initial_access
- attack.t1190
logsource:
category: webserver
detection:
selection:
cs-uri-query|contains:
- '..'
- 'SELECT'
- 'UNION'
- '<script'
- 'cmd='
- '/etc/passwd'
condition: selection
falsepositives:
- Legitimate activity from CVE-2026-7812
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-7812 | Command Injection | 54yyyu code-mcp up to commit 4cfc4643541a110c906d93635b391bf7e357f4a8 |
| CVE-2026-7812 | Command Injection | Vulnerable function: git_operation in src/code_mcp/server.py |
| CVE-2026-7812 | Command Injection | Vulnerable component: MCP Tool |
| CVE-2026-7812 | Command Injection | Manipulation of argument 'operation' |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | May 05, 2026 at 08:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.