CVE-2026-6942
Published: 23 April 2026
Summary
CVE-2026-6942 is a critical-severity OS Command Injection (CWE-78) vulnerability. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 35.9% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
This vulnerability is AI-related — categorised as AI Agent Protocols and Integrations; in the Protocol-Specific Risks risk domain.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Requires validation of user-controlled JSON-RPC parameters to block shell metacharacters from bypassing the command filter and executing arbitrary OS commands.
Mandates timely flaw remediation by applying the specific patch available in radare2-mcp commit 482cde6500009112a8bc0b3fa8d2ef6180581ec0 to eliminate the command injection vulnerability.
Enforces least privilege for the radare2-mcp process, limiting the scope and impact of arbitrary OS commands executed via the injection vulnerability.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Unauthenticated remote OS command injection via JSON-RPC interface enables exploitation of public-facing application (T1190) leading to arbitrary command execution (T1059).
NVD Description
radare2-mcp version 1.6.0 and earlier contains an os command injection vulnerability that allows remote attackers to execute arbitrary commands by bypassing the command filter through shell metacharacters in user-controlled input passed to r2_cmd_str(). Attackers can inject shell metacharacters through the…
more
jsonrpc interface parameters to achieve remote code execution on the host running radare2-mcp without requiring authentication.
Deeper analysisAI
CVE-2026-6942 is an OS command injection vulnerability (CWE-78) in radare2-mcp version 1.6.0 and earlier. The flaw occurs in the r2_cmd_str() function, where user-controlled input passed through JSON-RPC interface parameters can bypass the command filter using shell metacharacters, allowing attackers to execute arbitrary OS commands.
Remote attackers can exploit this vulnerability over the network without authentication, requiring low complexity and no user interaction (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H, score 9.8). Exploitation achieves remote code execution on the host running radare2-mcp by injecting shell metacharacters into the affected parameters.
A patch addressing the vulnerability is available in a commit to the radare2-mcp repository at https://github.com/radareorg/radare2-mcp/commit/482cde6500009112a8bc0b3fa8d2ef6180581ec0. Further details on the issue and remediation are provided in the GitHub issue tracker at https://github.com/radareorg/radare2-mcp/issues/45 and the VulnCheck advisory at https://www.vulncheck.com/advisories/radare2-mcp-os-command-injection-via-shell-metacharacter-bypass.
Details
- CWE(s)
AI Security AnalysisAI
- AI Category
- AI Agent Protocols and Integrations
- Risk Domain
- Protocol-Specific Risks
- OWASP Top 10 for LLMs 2025
- None mapped
- Classification Reason
- Matched keywords: mcp, mcp