Cyber Posture

CVE-2025-11490

MediumPublic PoC

Published: 08 October 2025

Published
08 October 2025
Modified
29 April 2026
KEV Added
Patch
CVSS Score 6.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
EPSS Score 0.0017 38.4th percentile
Risk Priority 13 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-11490 is a medium-severity Command Injection (CWE-77) vulnerability in Wonderwhy-Er Desktopcommandermcp. Its CVSS base score is 6.3 (Medium).

Operationally, exploitation aligns with the MITRE ATT&CK technique Command and Scripting Interpreter (T1059); ranked at the 38.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

This vulnerability is AI-related — categorised as AI Agent Protocols and Integrations; in the LLM/Generative AI Risks risk domain.

The strongest mitigations our analysis identified are NIST 800-53 CM-7 (Least Functionality) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Command and Scripting Interpreter (T1059) and 2 other techniques. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly prevents OS command injection by validating inputs to the extractBaseCommand function against malicious absolute paths and shell metacharacters.

prevent

Restricts the command manager to least functionality by permitting only simple whitelisted command names without absolute paths, matching vendor-described safe AI workflows.

prevent

Reduces impact of successful command injection by enforcing least privilege on the DesktopCommanderMCP process handling remote low-privilege inputs.

MITRE ATT&CK Enterprise TechniquesAI

T1059 Command and Scripting Interpreter Execution
Adversaries may abuse command and script interpreters to execute commands, scripts, or binaries.
T1202 Indirect Command Execution Stealth
Adversaries may abuse utilities that allow for command execution to bypass security restrictions that limit the use of command-line interpreters.
T1210 Exploitation of Remote Services Lateral Movement
Adversaries may exploit remote services to gain unauthorized access to internal systems once inside of a network.
Why these techniques?

OS command injection via absolute path bypass in command handler enables remote arbitrary OS command execution (T1210), abuse of command interpreters (T1059), and indirect command execution through the flawed parser (T1202).

NVD Description

A vulnerability has been found in wonderwhy-er DesktopCommanderMCP up to 0.2.13. The affected element is the function extractBaseCommand of the file src/command-manager.ts of the component Absolute Path Handler. Such manipulation leads to os command injection. The attack may be performed…

more

from remote. The exploit has been disclosed to the public and may be used. The vendor explains: "The usual use case is that AI is asked to do something, picks commands itself, and typically uses simple command names without absolute paths. It's curious why a user would ask the model to bypass restrictions this way. (...) This could potentially be a problem, but we are yet to hear reports of this being an issue in actual workflows. We'll leave this issue open for situations where people may report this as a problem for the long term."

Deeper analysisAI

CVE-2025-11490 is an OS command injection vulnerability affecting wonderwhy-er DesktopCommanderMCP versions up to 0.2.13. The issue resides in the extractBaseCommand function within the src/command-manager.ts file of the Absolute Path Handler component. Manipulation of this function enables arbitrary OS command execution, as classified under CWE-77 and CWE-78, with a CVSS v3.1 base score of 6.3 (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L).

The vulnerability can be exploited remotely by attackers who possess low privileges (PR:L), requiring network access with low complexity and no user interaction. Successful exploitation allows limited impacts on confidentiality, integrity, and availability, potentially enabling command injection to execute arbitrary operating system commands on the affected system.

Advisories reference GitHub issue #218 in the DesktopCommanderMCP repository, where the vendor acknowledges the vulnerability but notes no reports of real-world issues in workflows. They describe the typical use case as AI models selecting simple command names without absolute paths and question user intent to bypass restrictions this way, opting to leave the issue open for potential future reports. No patches are mentioned in the provided references.

The exploit has been publicly disclosed and may be usable. The vulnerability carries AI relevance, as the vendor highlights AI-driven command selection in standard operations, with no known real-world exploitation reported to date.

Details

CWE(s)

Affected Products

wonderwhy-er
desktopcommandermcp
≤ 0.2.13

AI Security AnalysisAI

AI Category
AI Agent Protocols and Integrations
Risk Domain
LLM/Generative AI Risks
OWASP Top 10 for LLMs 2025
None mapped
Classification Reason
DesktopCommanderMCP is a component designed for AI agents to execute desktop commands, where AI models generate commands that are processed by the command manager (src/command-manager.ts). The vulnerability involves bypassing a command blocklist via absolute paths in AI-generated commands, directly tying it to AI agent integrations and protocols for command execution.

CVEs Like This One

CVE-2025-11491Same product: Wonderwhy-Er Desktopcommandermcp
CVE-2025-11285Shared CWE-77, CWE-78
CVE-2025-59834Shared CWE-77, CWE-78
CVE-2026-7593Shared CWE-77, CWE-78
CVE-2026-6130Shared CWE-77, CWE-78
CVE-2026-7064Shared CWE-77, CWE-78
CVE-2026-7785Shared CWE-77, CWE-78
CVE-2026-2131Shared CWE-77, CWE-78
CVE-2026-7443Shared CWE-77, CWE-78
CVE-2026-5802Shared CWE-77, CWE-78

References