CVE-2025-53818:
GitHub Kanban MCP Server vulnerable to Command Injection
N/A
Basic Information
Technical Details
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
@sunwood-ai-labs/github-kanban-mcp-server | npm | <= 0.3.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability analysis identified a critical command injection flaw in the @sunwood-ai-labs/github-kanban-mcp-server
package, specifically in versions up to and including 0.3.0
. The root cause is the insecure use of the exec
function (wrapped in execAsync
) within the handleAddComment
function located in src/handlers/comment-handlers.ts
.
The data flow begins in the handleToolRequest
function, which acts as a router for different tools. When the add_comment
tool is invoked, handleToolRequest
extracts parameters from the request, including issue_number
. This user-controllable issue_number
is then passed to the handleAddComment
function.
Inside handleAddComment
, the issue_number
is directly concatenated into a string that is executed as a shell command. This allows an attacker to inject arbitrary shell commands by crafting a malicious issue_number
payload (e.g., 123; malicious_command
). The application fails to sanitize or use safer alternatives like execFile
, which would treat arguments as data rather than executable code.
Although the official advisory states there is no patched version, an analysis of the repository's tags and commits between the last vulnerable version (v0.3.0
) and the next release (v0.4.0
) indicates that the issue was addressed. The refactoring in version v0.4.0
appears to have removed the vulnerable execAsync
call as part of a larger code change, even though it wasn't explicitly marked as a security fix. Therefore, any environment running version 0.3.0
or older is exposed to this high-severity remote command execution vulnerability.
Vulnerable functions
handleAddComment
src/handlers/comment-handlers.ts
handleToolRequest
src/handlers/tool-handlers.ts