Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. @coding-solo/godot-mcp
  4. ›
  5. CVE-2026-25546

CVE-2026-25546: godot-mcp has Command Injection via unsanitized projectPath

February 4, 2026 (updated February 5, 2026)

A Command Injection vulnerability in godot-mcp allows remote code execution. The executeOperation function passed user-controlled input (e.g., projectPath) directly to exec(), which spawns a shell. An attacker could inject shell metacharacters like $(command) or &calc to execute arbitrary commands with the privileges of the MCP server process.

This affects any tool that accepts projectPath, including create_scene, add_node, load_sprite, and others.

References

  • github.com/Coding-Solo/godot-mcp
  • github.com/Coding-Solo/godot-mcp/commit/21c785d923cfdb471ea60323c13807d62dfecc5a
  • github.com/Coding-Solo/godot-mcp/issues/64
  • github.com/Coding-Solo/godot-mcp/pull/67
  • github.com/Coding-Solo/godot-mcp/security/advisories/GHSA-8jx2-rhfh-q928
  • github.com/advisories/GHSA-8jx2-rhfh-q928
  • nvd.nist.gov/vuln/detail/CVE-2026-25546

Code Behaviors & Features

Detect and mitigate CVE-2026-25546 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 0.1.1

Fixed versions

  • 0.1.1

Solution

Upgrade to version 0.1.1 or above.

Impact 7.8 HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

Source file

npm/@coding-solo/godot-mcp/CVE-2026-25546.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 07 Feb 2026 12:17:58 +0000.