Command Injection Vulnerability in kleneway Awesome Cursor MPC Server
CVE-2026-7629
Key Information:
- Vendor
Kleneway
- Vendor
- CVE Published:
- 2 May 2026
Badges
What is CVE-2026-7629?
A vulnerability has been discovered in the kleneway awesome-cursor-mpc-server affecting versions up to 2.0.1. The flaw exists within the runCodeReviewTool function in the codeReview.ts file, which is part of the Ccode-Review Tool component. This vulnerability allows an attacker to execute arbitrary commands by manipulating requests sent to the server. The attack can be initiated remotely, raising concerns for exposed systems. Although the project has been made aware of the issue through a pull request, no response or mitigation has been implemented as of yet.
Affected Version(s)
awesome-cursor-mpc-server 2.0.0
awesome-cursor-mpc-server 2.0.1
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- ๐ก
Public PoC available
- ๐พ
Exploit known to exist
Vulnerability published
Vulnerability Reserved
