Snyk has a proof-of-concept or detailed explanation of how to exploit this vulnerability.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade stata-mcp to version 1.13.0 or higher.
stata-mcp is a Let LLM help you achieve your regression analysis with Stata
Affected versions of this package are vulnerable to Command Injection via the stata_do tool’s handling of Stata do-files. The server executes user-provided or LLM-generated do-files with subprocess.Popen(..., shell=True) and does not validate or sanitize their contents. Because Stata supports shell-escape directives such as !whoami, !ls, or shell curl ..., an attacker can embed arbitrary OS command escapes inside a do-file and have them executed on the host system, leading to remote code execution (RCE).