Command Injection Affecting radareorg/radare2-mcp package, versions [,1.7.0)


Severity

Recommended
0.0
critical
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.35% (58th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Command Injection vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-UNMANAGED-RADAREORGRADARE2MCP-16325164
  • published1 May 2026
  • disclosed24 Apr 2026
  • creditManthan Ghasadiya

Introduced: 24 Apr 2026

NewCVE-2026-6942  (opens in a new tab)
CWE-78  (opens in a new tab)

How to fix?

Upgrade radareorg/radare2-mcp to version 1.7.0 or higher.

Overview

Affected versions of this package are vulnerable to Command Injection via the r2_cmd_str function. An attacker can execute arbitrary commands on the host system by injecting shell metacharacters through parameters in the jsonrpc interface.

CVSS Base Scores

version 4.0
version 3.1