CVE-2026-26029

7.5 HIGH

📋 TL;DR

CVE-2026-26029 is a command injection vulnerability in sf-mcp-server that allows attackers to execute arbitrary shell commands by injecting malicious input into Salesforce CLI commands. This affects users of Claude for Desktop with the sf-mcp-server integration. Successful exploitation gives attackers the same privileges as the MCP server process.

💻 Affected Systems

Products:
  • sf-mcp-server
Versions: All versions before commit 99fba0171b8c22b5ee3c0405053ccfd2910a066d
Operating Systems: Linux, macOS, Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists when user input is passed to Salesforce CLI commands through the MCP server interface.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the host system with privilege escalation to root/admin, allowing data theft, ransomware deployment, or persistent backdoor installation.

🟠

Likely Case

Unauthorized access to Salesforce data, credential theft, and lateral movement within the network from the compromised host.

🟢

If Mitigated

Limited impact if server runs with minimal privileges and network segmentation prevents lateral movement.

🌐 Internet-Facing: MEDIUM - While the server typically isn't internet-facing, if exposed, exploitation is straightforward.
🏢 Internal Only: HIGH - Internal attackers or compromised internal systems can easily exploit this to gain shell access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires access to the MCP server interface, which typically requires some level of access to the Claude for Desktop application.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Commit 99fba0171b8c22b5ee3c0405053ccfd2910a066d or later

Vendor Advisory: https://github.com/akutishevsky/sf-mcp-server/security/advisories/GHSA-h4w9-g9c5-vfwq

Restart Required: Yes

Instructions:

1. Update sf-mcp-server to latest version. 2. Restart Claude for Desktop. 3. Verify the fix by checking the commit hash matches or exceeds 99fba0171b8c22b5ee3c0405053ccfd2910a066d.

🔧 Temporary Workarounds

Disable sf-mcp-server

all

Temporarily disable the vulnerable component until patching is possible

Remove or disable sf-mcp-server integration from Claude for Desktop settings

Run with minimal privileges

all

Run Claude for Desktop with non-administrative user account

🧯 If You Can't Patch

  • Isolate the system running Claude for Desktop from sensitive networks and data
  • Implement strict network segmentation and monitor for unusual process execution

🔍 How to Verify

Check if Vulnerable:

Check if sf-mcp-server is installed and if the commit hash is earlier than 99fba0171b8c22b5ee3c0405053ccfd2910a066d

Check Version:

Check the sf-mcp-server directory for .git folder and run: git log --oneline -1

Verify Fix Applied:

Verify the installed sf-mcp-server commit hash is 99fba0171b8c22b5ee3c0405053ccfd2910a066d or later

📡 Detection & Monitoring

Log Indicators:

  • Unusual child process spawns from Claude for Desktop
  • Salesforce CLI commands with unexpected arguments or shell metacharacters

Network Indicators:

  • Unexpected outbound connections from Claude for Desktop process
  • Command and control traffic from the host

SIEM Query:

Process creation where parent process contains 'claude' or 'sf-mcp' and command line contains shell metacharacters like ;, &, |, $, (, ), {, }

🔗 References

📤 Share & Export