CVE-2026-25546

Godot MCP is a Model Context Protocol (MCP) server for interacting with the Godot game engine. Prior to version 0.1.1, a command injection vulnerability in godot-mcp allows remote code execution. The executeOperation function passed user-controlled input (e.g., projectPath) directly to exec(), which spawns a shell. An attacker could inject shell metacharacters like $(command) or &calc to execute arbitrary commands with the privileges of the MCP server process. This affects any tool that accepts projectPath, including create_scene, add_node, load_sprite, and others. This issue has been patched in version 0.1.1.
Configurations

Configuration 1 (hide)

cpe:2.3:a:coding-solo:godot_mcp:*:*:*:*:*:*:*:*

History

18 Mar 2026, 14:25

Type Values Removed Values Added
Summary
  • (es) Godot MCP es un servidor de Model Context Protocol (MCP) para interactuar con el motor de juego Godot. Antes de la versión 0.1.1, una vulnerabilidad de inyección de comandos en godot-mcp permite la ejecución remota de código. La función executeOperation pasaba la entrada controlada por el usuario (p. ej., projectPath) directamente a exec(), lo que genera un shell. Un atacante podría inyectar metacaracteres de shell como $(command) o &calc para ejecutar comandos arbitrarios con los privilegios del proceso del servidor MCP. Esto afecta a cualquier herramienta que acepte projectPath, incluyendo create_scene, add_node, load_sprite y otras. Este problema ha sido parcheado en la versión 0.1.1.
References () https://github.com/Coding-Solo/godot-mcp/commit/21c785d923cfdb471ea60323c13807d62dfecc5a - () https://github.com/Coding-Solo/godot-mcp/commit/21c785d923cfdb471ea60323c13807d62dfecc5a - Patch
References () https://github.com/Coding-Solo/godot-mcp/issues/64 - () https://github.com/Coding-Solo/godot-mcp/issues/64 - Issue Tracking
References () https://github.com/Coding-Solo/godot-mcp/pull/67 - () https://github.com/Coding-Solo/godot-mcp/pull/67 - Issue Tracking, Patch
References () https://github.com/Coding-Solo/godot-mcp/security/advisories/GHSA-8jx2-rhfh-q928 - () https://github.com/Coding-Solo/godot-mcp/security/advisories/GHSA-8jx2-rhfh-q928 - Vendor Advisory
First Time Coding-solo
Coding-solo godot Mcp
CPE cpe:2.3:a:coding-solo:godot_mcp:*:*:*:*:*:*:*:*

04 Feb 2026, 22:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-04 22:16

Updated : 2026-03-18 14:25


NVD link : CVE-2026-25546

Mitre link : CVE-2026-25546

CVE.ORG link : CVE-2026-25546


JSON object : View

Products Affected

coding-solo

  • godot_mcp
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')