CVE-2026-6980
Published: 25 April 2026
Summary
CVE-2026-6980 is a high-severity Injection (CWE-74) vulnerability. Its CVSS base score is 7.3 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 15.7% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
This vulnerability is AI-related — categorised as AI Agent Protocols and Integrations; in the Protocol-Specific Risks risk domain.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly prevents command injection by requiring validation of the untrusted 'command' argument passed to the repo_path function in main.py.
Requires identification and correction of the specific command injection flaw in GitPilot-MCP up to commit 9ed9f153ba4158a2ad230ee4871b25130da29ffd, despite lack of vendor patch.
Limits potential impact of remotely injected OS commands by enforcing least privilege on the process handling the vulnerable repo_path function.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Command injection in a remotely accessible function allows arbitrary OS command execution without authentication, directly enabling exploitation of public-facing applications (T1190) and use of command/scripting interpreters for execution (T1059).
NVD Description
A vulnerability has been found in Divyanshu-hash GitPilot-MCP up to 9ed9f153ba4158a2ad230ee4871b25130da29ffd. This impacts the function repo_path of the file main.py. Such manipulation of the argument command leads to command injection. The attack can be launched remotely. The exploit has been…
more
disclosed to the public and may be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The vendor was contacted early about this disclosure but did not respond in any way.
Deeper analysisAI
CVE-2026-6980 is a command injection vulnerability in the Divyanshu-hash GitPilot-MCP project, specifically affecting the repo_path function in the main.py file up to commit 9ed9f153ba4158a2ad230ee4871b25130da29ffd. The flaw arises from improper handling of the 'command' argument, allowing arbitrary command execution. The product lacks versioning, so no specific affected or unaffected releases are available. It has a CVSS v3.1 base score of 7.3 (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L) and is associated with CWEs 74 and 77.
The vulnerability is exploitable remotely over the network with low complexity and no authentication or user interaction required. Attackers can manipulate the 'command' argument to inject and execute arbitrary operating system commands on the host running the affected GitPilot-MCP instance, potentially leading to limited impacts on confidentiality, integrity, and availability.
Advisories from VulDB and a GitHub issue in wing3e/public_exp indicate the exploit has been publicly disclosed and may be actively used. The vendor was notified early but provided no response, and no patches or mitigation guidance are available in the referenced sources.
Notable context includes the public availability of the exploit, increasing the risk of real-world attacks against exposed instances, with no evidence of vendor remediation.
Details
- CWE(s)
AI Security AnalysisAI
- AI Category
- AI Agent Protocols and Integrations
- Risk Domain
- Protocol-Specific Risks
- OWASP Top 10 for LLMs 2025
- None mapped
- Classification Reason
- Matched keywords: mcp