Skip to content
CVSS 7.3 · HIGH

CVE-2026-7215

A security flaw has been discovered in egtai gmx-vmd-mcp up to 0.1.0. This issue affects the function launch_vmd_gui_tool of the file mcp_server.py of the component VMD Launch Handler. The manipulation of the argument structure_file/trajectory_file results in command injection. The attack may be launched remotely. The exploit has been released to the public and may be used for attacks. The project was informed of the problem early through an issue report but has not responded yet.

Ver en NVD

Análisis

This vulnerability allows remote command injection in a specialized scientific computing tool for molecular dynamics simulations. While the impact is high, the software is highly niche and not used in general web, mobile, or backend development, making it irrelevant for the broader community.

Severidad

Puntaje: 7.3(HIGH)
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
AV: NETWORK
AC: LOW
PR: NONE
UI: NONE
S: UNCHANGED
C: LOW
I: LOW
A: LOW
Tipo de falla (CWE): CWE-74CWE-77

EPSS

Probabilidad de explotación (próx. 30 días): 0.0218 (2.2%)
Percentil: 84.4%
EPSS: 2026-05-06

Descripción técnica

A security flaw has been discovered in egtai gmx-vmd-mcp up to 0.1.0. This issue affects the function launch_vmd_gui_tool of the file mcp_server.py of the component VMD Launch Handler. The manipulation of the argument structure_file/trajectory_file results in command injection. The attack may be launched remotely. The exploit has been released to the public and may be used for attacks. The project was informed of the problem early through an issue report but has not responded yet.

Publicada: 28/4/2026, 3:16:04
Última modificación: 29/4/2026, 1:00:01

Referencias

InicioEventosBlogRecursosEquipo