A vulnerability was identified in XixianLiang HarmonyOS-mcp-server 0.1.0. This vulnerability affects the function input_text. The manipulation of the argument text leads to os command injection. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.
History

Thu, 05 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Xixianliang harmonyos Mcp Server
CPEs cpe:2.3:a:xixianliang:harmonyos_mcp_server:0.1.0:*:*:*:*:*:*:*
Vendors & Products Xixianliang harmonyos Mcp Server

Tue, 10 Feb 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 09 Feb 2026 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Xixianliang
Xixianliang harmonyos-mcp-server
Vendors & Products Xixianliang
Xixianliang harmonyos-mcp-server

Sun, 08 Feb 2026 03:00:00 +0000

Type Values Removed Values Added
Description A vulnerability was identified in XixianLiang HarmonyOS-mcp-server 0.1.0. This vulnerability affects the function input_text. The manipulation of the argument text leads to os command injection. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.
Title XixianLiang HarmonyOS-mcp-server input_text os command injection
Weaknesses CWE-77
CWE-78
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published: 2026-02-08T02:32:07.119Z

Updated: 2026-02-23T09:37:10.319Z

Reserved: 2026-02-06T20:52:48.170Z

Link: CVE-2026-2131

cve-icon Vulnrichment

Updated: 2026-02-10T19:45:36.796Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-08T03:15:49.047

Modified: 2026-03-05T20:12:07.977

Link: CVE-2026-2131

cve-icon Redhat

No data.