Command Injection Vulnerability in Markdownify Model Context Protocol Server
CVE-2025-58358

7.5HIGH

Key Information:

Vendor

Zcaceres

Vendor
CVE Published:
4 September 2025

What is CVE-2025-58358?

Markdownify, a Model Context Protocol server designed for converting various inputs to Markdown, is susceptible to a command injection vulnerability in versions prior to 0.0.2. This issue arises from inadequate sanitization of input parameters during the execution of child_process.exec, allowing attackers to execute arbitrary system commands. If leveraged successfully, this vulnerability can facilitate remote code execution under the privileges of the server process. The server's construction and execution of shell commands with unvalidated user input significantly increase the risk of shell metacharacter injection (such as |, >, &&, etc.). The issue has been mitigated in version 0.0.2.

Affected Version(s)

markdownify-mcp < 0.0.2

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2025-58358 : Command Injection Vulnerability in Markdownify Model Context Protocol Server