CVE-2025-9654

6.3 MEDIUM

📋 TL;DR

CVE-2025-9654 is a command injection vulnerability in AiondaDotCom mcp-ssh up to version 1.0.3 that allows remote attackers to execute arbitrary commands on affected systems. The vulnerability exists in the server-simple.mjs file and can be exploited without authentication. Organizations using vulnerable versions of mcp-ssh for SSH server functionality are affected.

💻 Affected Systems

Products:
  • AiondaDotCom mcp-ssh
Versions: Up to and including version 1.0.3
Operating Systems: All platforms running Node.js
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the server-simple.mjs functionality; any deployment using this component is vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining root/system-level access, data exfiltration, ransomware deployment, or complete system takeover.

🟠

Likely Case

Unauthorized command execution leading to data theft, service disruption, or lateral movement within the network.

🟢

If Mitigated

Limited impact due to network segmentation, least privilege configurations, and proper input validation preventing successful exploitation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Command injection vulnerabilities typically have low exploitation complexity; remote unauthenticated access increases risk.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.0.4 or 1.1.0

Vendor Advisory: https://github.com/AiondaDotCom/mcp-ssh/commit/cd2566a948b696501abfa6c6b03462cac5fb43d8

Restart Required: Yes

Instructions:

1. Stop the mcp-ssh service. 2. Update package using npm: 'npm update @aiondadotcom/mcp-ssh'. 3. Verify version is 1.0.4 or higher. 4. Restart the service.

🔧 Temporary Workarounds

Network Access Restriction

linux

Restrict network access to mcp-ssh service to trusted IPs only

iptables -A INPUT -p tcp --dport [SSH_PORT] -s [TRUSTED_IP] -j ACCEPT
iptables -A INPUT -p tcp --dport [SSH_PORT] -j DROP

🧯 If You Can't Patch

  • Implement strict input validation and sanitization for all user inputs to the server-simple.mjs component
  • Run mcp-ssh service with minimal privileges using a dedicated non-root user account

🔍 How to Verify

Check if Vulnerable:

Check package.json or run: npm list @aiondadotcom/mcp-ssh | grep version

Check Version:

npm list @aiondadotcom/mcp-ssh | grep version

Verify Fix Applied:

Verify version is 1.0.4 or higher and check for commit cd2566a948b696501abfa6c6b03462cac5fb43d8 in git history

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution patterns in system logs
  • Unexpected process spawns from mcp-ssh service
  • Failed authentication attempts followed by successful command execution

Network Indicators:

  • Unusual outbound connections from mcp-ssh server
  • SSH traffic from unexpected sources

SIEM Query:

source="mcp-ssh" AND (event="command_execution" OR process="unusual_command")

🔗 References

📤 Share & Export