CVE-2026-7215 PUBLISHED

egtai gmx-vmd-mcp VMD Launch mcp_server.py launch_vmd_gui_tool command injection

Assigner: VulDB
Reserved: 27.04.2026 Published: 28.04.2026 Updated: 28.04.2026

A security flaw has been discovered in egtai gmx-vmd-mcp up to 0.1.0. This issue affects the function launch_vmd_gui_tool of the file mcp_server.py of the component VMD Launch Handler. The manipulation of the argument structure_file/trajectory_file results in command injection. The attack may be launched remotely. The exploit has been released to the public and may be used for attacks. The project was informed of the problem early through an issue report but has not responded yet.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
CVSS Score: 6.9

Product Status

Vendor egtai
Product gmx-vmd-mcp
Versions
  • Version 0.1.0 is affected

Credits

  • SmallW (VulDB User) reporter
  • VulDB CNA Team coordinator

References

Problem Types

  • Command Injection CWE
  • Injection CWE