No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 13 Apr 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 13 Apr 2026 13:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Chatboxai
Chatboxai chatbox |
|
| Vendors & Products |
Chatboxai
Chatboxai chatbox |
Sun, 12 Apr 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw has been found in chatboxai chatbox up to 1.20.0. This impacts the function StdioClientTransport of the file src/main/mcp/ipc-stdio-transport.ts of the component Model Context Protocol Server Management System. Executing a manipulation of the argument args/env can lead to os command injection. The attack can be launched remotely. The exploit has been published and may be used. The project was informed of the problem early through an issue report but has not responded yet. | |
| Title | chatboxai chatbox Model Context Protocol Server Management System ipc-stdio-transport.ts StdioClientTransport os command injection | |
| Weaknesses | CWE-77 CWE-78 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-04-13T15:34:55.885Z
Reserved: 2026-04-12T04:30:52.194Z
Link: CVE-2026-6130
Updated: 2026-04-13T15:34:52.998Z
Status : Awaiting Analysis
Published: 2026-04-12T22:16:09.360
Modified: 2026-04-13T15:01:43.663
Link: CVE-2026-6130
No data.
OpenCVE Enrichment
Updated: 2026-04-13T12:53:58Z