Overview
This report details a critical vulnerability (CVE-2025-53107) in @cyanheads/git-mcp-server, an MCP server designed to interact with Git repositories. The vulnerability poses a significant risk to any organization using versions of the server prior to 2.1.5. If exploited, this vulnerability could lead to a total system compromise or data leakage.
Vulnerability Summary
CVE ID: CVE-2025-53107
Severity: High (CVSS: 7.5)
Attack Vector: Network
Privileges Required: None
User Interaction: Required
Impact: Total system compromise or data leakage
Affected Products
Product | Affected Versions
@cyanheads/git-mcp-server | Prior to 2.1.5
How the Exploit Works
The vulnerability stems from an insecure use of input parameters within a call to child_process.exec in @cyanheads/git-mcp-server. The server constructs and executes shell commands using unvalidated user input directly within command-line strings. This allows for the injection of shell metacharacters (|, >, &&, etc.), enabling an attacker to inject arbitrary system commands. If successfully exploited, this vulnerability can lead to remote code execution under the server process’s privileges, which in turn can lead to a full system compromise or data leakage.
Conceptual Example Code
Below is a
conceptual
example of how the vulnerability might be exploited. Please note that this is illustrative and does not represent an actual exploit.
# Connect to the server
$ mcp-client connect target.example.com
# Inject malicious command
$ mcp-client exec "git log; rm -rf /*"
In this example, an attacker connects to the target server using a vulnerable MCP client and then executes a command that first performs a harmless action (reading git logs) followed by a destructive action (deleting all files on the system).
Mitigation Guidance
Users of @cyanheads/git-mcp-server should immediately upgrade to version 2.1.5 or later, which contains a patch for this vulnerability. If upgrading is not immediately possible, temporary mitigation can be achieved by using a Web Application Firewall (WAF) or Intrusion Detection System (IDS) to block or detect malicious commands.
