Cyber Posture

CVE-2026-7590

High

Published: 01 May 2026

Published
01 May 2026
Modified
01 May 2026
KEV Added
Patch
CVSS Score 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
EPSS Score 0.0218 84.5th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-7590 is a high-severity Command Injection (CWE-77) vulnerability. Its CVSS base score is 7.3 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 15.5% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 RA-5 (Vulnerability Monitoring and Scanning) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly prevents OS command injection by requiring validation and sanitization of untrusted inputs like the dev_script argument at application entry points.

prevent

Ensures timely remediation of known software flaws such as this command injection vulnerability through identification, reporting, and patching.

detect

Vulnerability scanning identifies command injection flaws in the Preview Endpoint component, enabling proactive mitigation before exploitation.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059 Command and Scripting Interpreter Execution
Adversaries may abuse command and script interpreters to execute commands, scripts, or binaries.
Why these techniques?

OS command injection in public-facing Preview Endpoint enables remote arbitrary command execution, directly mapping to T1190 for initial access via public app exploitation and T1059 for command interpreter usage.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

A vulnerability was identified in eyal-gor p_69_branch_monkey_mcp up to 69bc71874ce40050ef45fde5a435855f18af3373. The affected element is an unknown function of the file branch_monkey_mcp/bridge_and_local_actions/routes/advanced.py of the component Preview Endpoint. Such manipulation of the argument dev_script leads to os command injection. The attack can…

more

be launched remotely. The exploit is publicly available and might be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The project was informed of the problem early through an issue report but has not responded yet.

Deeper analysisAI

CVE-2026-7590 is an OS command injection vulnerability (CWE-77, CWE-78) affecting the eyal-gor/p_69_branch_monkey_mcp project up to commit 69bc71874ce40050ef45fde5a435855f18af3373. The issue resides in an unknown function within the file branch_monkey_mcp/bridge_and_local_actions/routes/advanced.py, part of the Preview Endpoint component. Attackers can exploit it by manipulating the dev_script argument, enabling arbitrary command execution on the host system. The project lacks versioning, so specific affected and unaffected releases are unavailable.

The vulnerability carries a CVSS v3.1 base score of 7.3 (High), with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction needed (UI:N), and unchanged scope (S:U), resulting in low impacts to confidentiality, integrity, and availability (C:I:A:L/L/L). Remote attackers can exploit it without authentication to inject and execute operating system commands, potentially leading to unauthorized access, data exfiltration, or system compromise depending on the environment.

Advisories from VulDB (vuln/360543) and the project's GitHub issue #8 indicate the vulnerability was reported early to maintainers, but they have not responded or issued patches. No mitigation guidance or fixes are available in the referenced sources, and security practitioners should review the repository at https://github.com/eyal-gor/p_69_branch_monkey_mcp for any updates.

A publicly available exploit exists, increasing the risk of active exploitation.

Details

CWE(s)

CVEs Like This One

CVE-2025-1676Shared CWE-77, CWE-78
CVE-2026-2184Shared CWE-77, CWE-78
CVE-2026-5973Shared CWE-77, CWE-78
CVE-2025-59740Shared CWE-77, CWE-78
CVE-2025-1536Shared CWE-77, CWE-78
CVE-2026-4585Shared CWE-77, CWE-78
CVE-2026-4170Shared CWE-77, CWE-78
CVE-2026-2952Shared CWE-77, CWE-78
CVE-2025-1546Shared CWE-77, CWE-78
CVE-2026-5972Shared CWE-77, CWE-78

References