CVE-2026-7058 PUBLISHED

666ghj MiroFish Inter-Process Communication simulation_ipc.py SimulationIPCClient.send_command command injection

Assigner: VulDB
Reserved: 26.04.2026 Published: 26.04.2026 Updated: 27.04.2026

A vulnerability has been found in 666ghj MiroFish up to 0.1.2. The impacted element is the function SimulationIPCClient.send_command of the file backend/app/services/simulation_ipc.py of the component Inter-Process Communication. Such manipulation leads to command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The project was informed of the problem early through an issue report but has not responded yet.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
CVSS Score: 6.9

Product Status

Vendor 666ghj
Product MiroFish
Versions
  • Version 0.1.0 is affected
  • Version 0.1.1 is affected
  • Version 0.1.2 is affected

Credits

  • York Shen (VulDB User) reporter
  • VulDB CNA Team coordinator

References

Problem Types

  • Command Injection CWE
  • Injection CWE