CVE-2026-30624

Agent Zero 0.9.8 contains a remote code execution vulnerability in its External MCP Servers configuration feature. The application allows users to define MCP servers using a JSON configuration containing arbitrary command and args values. These values are executed by the application when the configuration is applied without sufficient validation or restriction. An attacker may supply a malicious MCP configuration to execute arbitrary operating system commands, potentially resulting in remote code execution with the privileges of the Agent Zero process.
Configurations

Configuration 1 (hide)

cpe:2.3:a:agent-zero:agent-zero:0.9.8:-:*:*:*:*:*:*

History

20 Apr 2026, 20:17

Type Values Removed Values Added
References () https://www.ox.security/blog/mcp-supply-chain-advisory-rce-vulnerabilities-across-the-ai-ecosystem/ - () https://www.ox.security/blog/mcp-supply-chain-advisory-rce-vulnerabilities-across-the-ai-ecosystem/ - Third Party Advisory
CPE cpe:2.3:a:agent-zero:agent-zero:0.9.8:-:*:*:*:*:*:*
First Time Agent-zero agent-zero
Agent-zero

15 Apr 2026, 19:16

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.6
CWE CWE-77

15 Apr 2026, 16:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-15 16:16

Updated : 2026-04-20 20:17


NVD link : CVE-2026-30624

Mitre link : CVE-2026-30624

CVE.ORG link : CVE-2026-30624


JSON object : View

Products Affected

agent-zero

  • agent-zero
CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')