CVE-2025-35028 PUBLISHED

HexStrike AI MCP Server Command Injection

Assigner: AHA
Reserved: 15.04.2025 Published: 30.11.2025 Updated: 01.12.2025

By providing a command-line argument starting with a semi-colon ; to an API endpoint created by the EnhancedCommandExecutor class of the HexStrike AI MCP server, the resultant composed command is executed directly in the context of the MCP server’s normal privilege; typically, this is root. There is no attempt to sanitize these arguments in the default configuration of this MCP server at the affected version (as of commit 2f3a5512 in September of 2025).

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
CVSS Score: 9.1

Product Status

Vendor 0x4m4
Product HexStrike AI
Versions Default: unaffected
  • Version 33267047667b9accfbf0fdac1c1c7ff12f3a5512 is affected

Exploits

The original advisory contains two example working proofs-of-concept exploits (which disclose the running user and the local /etc/passwd file to the remote requestor).

Credits

  • jippen of AHA! finder
  • todb of AHA! coordinator

References

Problem Types

  • CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') CWE