CVE-2025-11202

9.8 CRITICAL

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code on win-cli-mcp-server installations without authentication. Attackers can inject malicious commands through the resolveCommandPath method, leading to full system compromise. All users running vulnerable versions are affected.

💻 Affected Systems

Products:
  • win-cli-mcp-server
Versions: All versions prior to commit 521b4a34190d03bde7d433d213c36357181a6d09
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Any installation exposing the vulnerable service endpoint is affected. No special configuration required for exploitation.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system takeover with attacker gaining service account privileges, enabling lateral movement, data exfiltration, and persistent backdoor installation.

🟠

Likely Case

Remote code execution leading to service disruption, data theft, and deployment of ransomware or other malware.

🟢

If Mitigated

Limited impact with proper network segmentation and least privilege service accounts, potentially containing damage to isolated segments.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

No authentication required makes exploitation trivial. The vulnerability is command injection in a system call, making weaponization straightforward.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Commit 521b4a34190d03bde7d433d213c36357181a6d09

Vendor Advisory: https://github.com/simon-ami/win-cli-mcp-server/commit/521b4a34190d03bde7d433d213c36357181a6d09

Restart Required: Yes

Instructions:

1. Update to latest version from GitHub repository
2. Restart win-cli-mcp-server service
3. Verify the commit hash includes 521b4a34190d03bde7d433d213c36357181a6d09

🔧 Temporary Workarounds

Network Isolation

windows

Restrict network access to win-cli-mcp-server service using firewall rules

netsh advfirewall firewall add rule name="Block win-cli-mcp-server" dir=in action=block protocol=TCP localport=<service_port>
netsh advfirewall firewall add rule name="Block win-cli-mcp-server" dir=out action=block protocol=TCP localport=<service_port>

Service Account Hardening

windows

Run win-cli-mcp-server with minimal privileges using a restricted service account

sc config "win-cli-mcp-server" obj="NT AUTHORITY\LocalService"
sc stop "win-cli-mcp-server"
sc start "win-cli-mcp-server"

🧯 If You Can't Patch

  • Disable win-cli-mcp-server service entirely if not required
  • Implement strict network segmentation and firewall rules to isolate vulnerable systems

🔍 How to Verify

Check if Vulnerable:

Check if win-cli-mcp-server is running and accessible on the network. Review service version against GitHub commit history.

Check Version:

Check git log or version file in win-cli-mcp-server installation directory

Verify Fix Applied:

Verify the installed version includes commit 521b4a34190d03bde7d433d213c36357181a6d09. Test that command injection attempts are properly sanitized.

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution patterns in win-cli-mcp-server logs
  • Service account performing unexpected system operations
  • Failed authentication attempts if logging enabled

Network Indicators:

  • Unusual network connections from win-cli-mcp-server service
  • Command injection patterns in network traffic to service port

SIEM Query:

source="win-cli-mcp-server" AND (command="*;*" OR command="*|*" OR command="*&*" OR command="*`*" OR command="*$(*")

🔗 References

📤 Share & Export