The vulnerability is a command injection flaw within the MCP (Multi-modal Content Platform) service management feature. Authenticated users could create or update an MCP service, setting the transport_type to 'stdio' and providing a malicious command and arguments in the stdio_config object. The application failed to validate this user-provided configuration. The vulnerable functions (*mcpServiceService).CreateMCPService and (*mcpServiceService).UpdateMCPService would accept this malicious data and save it to the database. The command execution was triggered by making a POST request to the /api/v1/mcp-services/{id}/test endpoint. This action calls the mcp.NewMCPClient function, which, prior to the patch, would read the malicious command from the configuration and use it to start a subprocess, leading to remote code execution. The fix involves adding a robust validation function, secutils.ValidateStdioConfig, which is now called from CreateMCPService, UpdateMCPService, and NewMCPClient to ensure that only whitelisted commands and safe arguments are processed, effectively preventing the injection.