CVE-2026-5602: @nor2/heim-mcp vulnerable to command injection
A vulnerability was determined in Nor2-io heim-mcp up to 0.1.3. Impacted is the function registerTools of the file src/tools.ts of the component new_heim_application/deploy_heim_application/deploy_heim_application_to_cloud. This manipulation causes os command injection. The attack requires local access. The exploit has been publicly disclosed and may be utilized. Patch name: c321d8af25f77668781e6ccb43a1336f9185df37. It is suggested to install a patch to address this issue. The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product.
References
- github.com/Nor2-io/heim-mcp
- github.com/Nor2-io/heim-mcp/commit/c321d8af25f77668781e6ccb43a1336f9185df37
- github.com/Nor2-io/heim-mcp/issues/1
- github.com/Nor2-io/heim-mcp/pull/2
- github.com/advisories/GHSA-wx4p-jr66-jfp9
- github.com/user-attachments/files/25889482/heim-mcp_bug.pdf
- nvd.nist.gov/vuln/detail/CVE-2026-5602
- vuldb.com/submit/784862
- vuldb.com/vuln/355394
- vuldb.com/vuln/355394/cti
Code Behaviors & Features
Detect and mitigate CVE-2026-5602 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →