Key Information Summary Vulnerability Overview Vulnerability Type: Command Injection Affected Package: node-code-sandbox-mcp Affected Versions: =1.2.10 CVE ID: CVE-2020-5352 Vulnerability Description This vulnerability exists in node-code-sandbox-mcp. When the MCP service is configured to run commands within a sandbox container, improper handling of user input may lead to command injection. Attackers can craft malicious requests to execute arbitrary system commands, thereby bypassing sandbox protections. Vulnerable Code Example PoC (Proof of Concept) 1. Setup Environment: - Download Docker image and create a folder. - Create a file named . 2. Indirect Command Injection Example: - Create a file named inside the container and attempt to read it. - Use MCP Inspector to send a request containing a malicious command, such as . Impact Direct Command Injection: May lead to Remote Code Execution (RCE) and server takeover. Indirect Command Injection: May result in data leakage and privilege escalation. Remediation Recommendations Avoid using functions like to directly execute commands based on user input. Use secure APIs such as or , and pass parameters as separate array elements to prevent command injection. Reference Links Node.js Blog OWASP Command Injection