CVE-2025-69256

The Serverless Framework is a framework for using AWS Lambda and other managed cloud services to build applications. Starting in version 4.29.0 and prior to version 4.29.3, a command injection vulnerability exists in the Serverless Framework's built-in MCP server package (@serverless/mcp). This vulnerability only affects users of the experimental MCP server feature (serverless mcp), which represents less than 0.1% of Serverless Framework users. The core Serverless Framework CLI and deployment functionality are not affected. The vulnerability is caused by the unsanitized use of input parameters within a call to `child_process.exec`, enabling an attacker to inject arbitrary system commands. Successful exploitation can lead to remote code execution under the server process's privileges. The server constructs and executes shell commands using unvalidated user input directly within command-line strings. This introduces the possibility of shell metacharacter injection (`|`, `>`, `&&`, etc.). Version 4.29.3 fixes the issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:serverless:serverless:*:*:*:*:*:*:*:*

History

23 Mar 2026, 14:42

Type Values Removed Values Added
References () https://github.com/serverless/serverless/blob/6213453da7df375aaf12fb3522ab8870488fc59a/packages/mcp/src/tools/list-projects.js#L68 - () https://github.com/serverless/serverless/blob/6213453da7df375aaf12fb3522ab8870488fc59a/packages/mcp/src/tools/list-projects.js#L68 - Product
References () https://github.com/serverless/serverless/commit/681ca039550c7169369f98780c6301a00f2dc4c4 - () https://github.com/serverless/serverless/commit/681ca039550c7169369f98780c6301a00f2dc4c4 - Patch
References () https://github.com/serverless/serverless/releases/tag/sf-core%404.29.3 - () https://github.com/serverless/serverless/releases/tag/sf-core%404.29.3 - Release Notes
References () https://github.com/serverless/serverless/security/advisories/GHSA-rwc2-f344-q6w6 - () https://github.com/serverless/serverless/security/advisories/GHSA-rwc2-f344-q6w6 - Exploit, Mitigation, Vendor Advisory
First Time Serverless serverless
Serverless
Summary
  • (es) El Serverless Framework es un framework para usar AWS Lambda y otros servicios en la nube gestionados para construir aplicaciones. A partir de la versión 4.29.0 y antes de la versión 4.29.3, existe una vulnerabilidad de inyección de comandos en el paquete de servidor MCP integrado del Serverless Framework (@serverless/mcp). Esta vulnerabilidad solo afecta a los usuarios de la característica experimental del servidor MCP (serverless mcp), lo que representa menos del 0.1% de los usuarios del Serverless Framework. La CLI y la funcionalidad de despliegue principales del Serverless Framework no se ven afectadas. La vulnerabilidad es causada por el uso no saneado de parámetros de entrada dentro de una llamada a `child_process.exec`, lo que permite a un atacante inyectar comandos de sistema arbitrarios. La explotación exitosa puede llevar a la ejecución remota de código bajo los privilegios del proceso del servidor. El servidor construye y ejecuta comandos de shell utilizando entrada de usuario no validada directamente dentro de cadenas de línea de comandos. Esto introduce la posibilidad de inyección de metacaracteres de shell ('|', '>', '&&', etc.). La versión 4.29.3 corrige el problema.
CPE cpe:2.3:a:serverless:serverless:*:*:*:*:*:*:*:*

30 Dec 2025, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-12-30 19:15

Updated : 2026-03-23 14:42


NVD link : CVE-2025-69256

Mitre link : CVE-2025-69256

CVE.ORG link : CVE-2025-69256


JSON object : View

Products Affected

serverless

  • serverless
CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')