CVE-2026-25546

7.8 HIGH

📋 TL;DR

CVE-2026-25546 is a command injection vulnerability in godot-mcp that allows remote code execution. Attackers can inject shell metacharacters through user-controlled inputs like projectPath to execute arbitrary commands with the MCP server's privileges. This affects all tools using godot-mcp before version 0.1.1.

💻 Affected Systems

Products:
  • godot-mcp
Versions: All versions prior to 0.1.1
Operating Systems: All platforms where godot-mcp runs
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerable in any configuration where user input reaches the executeOperation function. Affects multiple operations including create_scene, add_node, load_sprite.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full compromise of the server host with privilege escalation to root/system, data theft, ransomware deployment, or persistent backdoor installation.

🟠

Likely Case

Arbitrary command execution within the MCP server's process context, potentially leading to file system access, data exfiltration, or lateral movement.

🟢

If Mitigated

Limited impact if server runs with minimal privileges in isolated environment, but still allows command execution within that context.

🌐 Internet-Facing: HIGH - The vulnerability allows unauthenticated remote exploitation if the MCP server is exposed to untrusted networks.
🏢 Internal Only: MEDIUM - Still exploitable by internal users or compromised internal systems, but attack surface is reduced.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple command injection via shell metacharacters. No authentication required if server accepts external connections. Exploit trivial for attackers with basic shell knowledge.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 0.1.1

Vendor Advisory: https://github.com/Coding-Solo/godot-mcp/security/advisories/GHSA-8jx2-rhfh-q928

Restart Required: Yes

Instructions:

1. Stop the godot-mcp server. 2. Update to version 0.1.1 via package manager or manual installation. 3. Restart the server. 4. Verify the fix by checking version.

🔧 Temporary Workarounds

Input Validation and Sanitization

all

Implement strict input validation to reject any projectPath containing shell metacharacters

Implement regex validation: ^[a-zA-Z0-9\/\-\._]+$ for project paths

Network Isolation

all

Restrict godot-mcp server to localhost or trusted network segments only

Configure firewall to block external access to godot-mcp port
Use bind address 127.0.0.1 in server configuration

🧯 If You Can't Patch

  • Run godot-mcp with minimal privileges using a dedicated low-privilege user account
  • Implement network segmentation and restrict access to only trusted clients using firewall rules

🔍 How to Verify

Check if Vulnerable:

Check if godot-mcp version is below 0.1.1 and if user input reaches executeOperation function without validation

Check Version:

npm list godot-mcp | grep godot-mcp or check package.json version

Verify Fix Applied:

Confirm version is 0.1.1 or higher and test that shell metacharacters in projectPath no longer execute commands

📡 Detection & Monitoring

Log Indicators:

  • Unusual shell commands in process execution logs
  • Multiple failed command injection attempts in application logs
  • Unexpected child process spawns from godot-mcp

Network Indicators:

  • Unusual outbound connections from godot-mcp server
  • Traffic to suspicious IPs or domains from server process

SIEM Query:

process.name:"godot-mcp" AND process.cmdline:(*sh* OR *bash* OR *cmd* OR *powershell*)

🔗 References

📤 Share & Export