stata-mcp@1.10.1 vulnerabilities

Let LLM help you achieve your regression analysis with Stata

  • latest version

    1.13.8

  • latest non vulnerable version

  • first published

    6 months ago

  • latest version published

    1 days ago

  • licenses detected

  • Direct Vulnerabilities

    Known vulnerabilities in the stata-mcp package. This does not include vulnerabilities belonging to this package’s dependencies.

    Fix vulnerabilities automatically

    Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

    Fix for free
    VulnerabilityVulnerable Version
    • C
    Command Injection

    stata-mcp is a Let LLM help you achieve your regression analysis with Stata

    Affected versions of this package are vulnerable to Command Injection via the stata_do tool’s handling of Stata do-files. The server executes user-provided or LLM-generated do-files with subprocess.Popen(..., shell=True) and does not validate or sanitize their contents. Because Stata supports shell-escape directives such as !whoami, !ls, or shell curl ..., an attacker can embed arbitrary OS command escapes inside a do-file and have them executed on the host system, leading to remote code execution (RCE).

    How to fix Command Injection?

    Upgrade stata-mcp to version 1.13.0 or higher.

    [,1.13.0)