CVE-2025-54994
Expert Analysis
Professional remediation guidance
Get tailored security recommendations from our analyst team for CVE-2025-54994. We'll provide specific mitigation strategies based on your environment and risk profile.
Description
@akoskm/create-mcp-server-stdio is an MCP server starter kit that uses the StdioServerTransport. Prior to version 0.0.13, the MCP Server is written in a way that is vulnerable to command injection vulnerability attacks as part of some of its MCP Server tool definition and implementation. The MCP Server exposes the tool `which-app-on-port` which relies on Node.js child process API `exec` which is an unsafe and vulnerable API if concatenated with untrusted user input. Version 0.0.13 contains a fix for the issue.
Available Exploits
Related News
Affected Products
Affected Versions:
EU Vulnerability Database
Monitored by ENISA for EU cybersecurity
ENISA Analysis
@akoskm/create-mcp-server-stdio is an MCP server starter kit that uses the StdioServerTransport. Prior to version 0.0.13, the MCP Server is written in a way that is vulnerable to command injection vulnerability attacks as part of some of its MCP Server tool definition and implementation. The MCP Server exposes the tool `which-app-on-port` which relies on Node.js child process API `exec` which is an unsafe and vulnerable API if concatenated with untrusted user input. Version 0.0.13 contains a fix for the issue.
Affected Products (ENISA)
ENISA Scoring
CVSS Score (4.0)
ENISA References
Data provided by ENISA EU Vulnerability Database. Last updated: September 8, 2025
GitHub Security Advisories
Community-driven vulnerability intelligence from GitHub
@akoskm/create-mcp-server-stdio is vulnerable to MCP Server Command Injection through `exec` API
GHSA-3ch2-jxxc-v4xfAdvisory Details
Affected Packages
CVSS Scoring
CVSS Score
CVSS Vector
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
References
Advisory provided by GitHub Security Advisory Database. Published: September 8, 2025, Modified: September 8, 2025