Title: Github https://github.com/sequa-ai/sequa-mcp 0.0.1 OS Command Injection Description: The Sequa MCP client has a flawed implementation where it fails to sanitize metadata during OAuth server discovery. Specifically, the authorization_endpoint URL provided by the server is passed directly to an insecure open function. An attacker can exploit this by embedding a payload in the URL's authentication field, bypassing validation and achieving arbitrary OS command injection on the client's host machine. Source: https://lavender-bicycle-a5a.notion.site/Sequa-MCP-RCE-26853a41781f807da1c0cd158f9e3e1a?source=copy_link User: yhryhyrhyc_ (UID 83750) Submission Date: 09/08/2025 04:22 PM (10 days ago) Moderation Date: 09/17/2025 01:36 PM (9 days later) Status: Accepted VulDB Entry: [sequa-ai sequa-mcp up to 1.0.13 OAuth Server Discovery node-oauth-client-provider.ts redirectToAuthorization os command injection] Points: 17