Cyber Posture

CVE-2026-6942

CriticalPublic PoCRCE

Published: 23 April 2026

Published
23 April 2026
Modified
29 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0046 64.1th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-6942 is a critical-severity OS Command Injection (CWE-78) vulnerability. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 35.9% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

This vulnerability is AI-related — categorised as AI Agent Protocols and Integrations; in the Protocol-Specific Risks risk domain.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires validation of user-controlled JSON-RPC parameters to block shell metacharacters from bypassing the command filter and executing arbitrary OS commands.

prevent

Mandates timely flaw remediation by applying the specific patch available in radare2-mcp commit 482cde6500009112a8bc0b3fa8d2ef6180581ec0 to eliminate the command injection vulnerability.

prevent

Enforces least privilege for the radare2-mcp process, limiting the scope and impact of arbitrary OS commands executed via the injection vulnerability.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059 Command and Scripting Interpreter Execution
Adversaries may abuse command and script interpreters to execute commands, scripts, or binaries.
Why these techniques?

Unauthenticated remote OS command injection via JSON-RPC interface enables exploitation of public-facing application (T1190) leading to arbitrary command execution (T1059).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

radare2-mcp version 1.6.0 and earlier contains an os command injection vulnerability that allows remote attackers to execute arbitrary commands by bypassing the command filter through shell metacharacters in user-controlled input passed to r2_cmd_str(). Attackers can inject shell metacharacters through the…

more

jsonrpc interface parameters to achieve remote code execution on the host running radare2-mcp without requiring authentication.

Deeper analysisAI

CVE-2026-6942 is an OS command injection vulnerability (CWE-78) in radare2-mcp version 1.6.0 and earlier. The flaw occurs in the r2_cmd_str() function, where user-controlled input passed through JSON-RPC interface parameters can bypass the command filter using shell metacharacters, allowing attackers to execute arbitrary OS commands.

Remote attackers can exploit this vulnerability over the network without authentication, requiring low complexity and no user interaction (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H, score 9.8). Exploitation achieves remote code execution on the host running radare2-mcp by injecting shell metacharacters into the affected parameters.

A patch addressing the vulnerability is available in a commit to the radare2-mcp repository at https://github.com/radareorg/radare2-mcp/commit/482cde6500009112a8bc0b3fa8d2ef6180581ec0. Further details on the issue and remediation are provided in the GitHub issue tracker at https://github.com/radareorg/radare2-mcp/issues/45 and the VulnCheck advisory at https://www.vulncheck.com/advisories/radare2-mcp-os-command-injection-via-shell-metacharacter-bypass.

Details

CWE(s)

AI Security AnalysisAI

AI Category
AI Agent Protocols and Integrations
Risk Domain
Protocol-Specific Risks
OWASP Top 10 for LLMs 2025
None mapped
Classification Reason
Matched keywords: mcp, mcp

CVEs Like This One

CVE-2026-34935Shared CWE-78
CVE-2026-23882Shared CWE-78
CVE-2025-0680Shared CWE-78
CVE-2025-23316Shared CWE-78
CVE-2025-11900Shared CWE-78
CVE-2026-25108Shared CWE-78
CVE-2025-50197Shared CWE-78
CVE-2026-27190Shared CWE-78
CVE-2026-0980Shared CWE-78
CVE-2025-20014Shared CWE-78

References