7.5 HIGH
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): HIGH
- Privileges required (PR): NONE
- User interaction (UI): REQUIRED
- Scope (S): UNCHANGED
- Confidentiality impact (C): HIGH
- Integrity impact (I): HIGH
- Availability impact (A): HIGH
by @fricklerhandwerk Activity log
- Created automatic suggestion
- @fricklerhandwerk dismissed
Command execution in python-utcp allows attackers to achieve remote code execution when fetching a remote Manual from a malicious endpoint
The vulnerability arises when a client fetches a tools’ JSON specification, known as a Manual, from a remote Manual Endpoint. While a provider may initially serve a benign manual (e.g., one defining an HTTP tool call), earning the clients’ trust, a malicious provider can later change the manual to exploit the client.
References
Affected products
- <1.1.0
Matching in nixpkgs
pkgs.strutcpp
Collection of string utilities
-
nixos-25.11 0-unstable-2025-07-21
- nixpkgs-25.11-darwin 0-unstable-2025-07-21
Package maintainers
-
@SchweGELBin Jannik Michael Abram <abramjannikmichael06@gmail.com>