CVE-2025-10619
JavaScript vulnerability analysis and mitigation

Overview

A command injection vulnerability (CVE-2025-10619) was discovered in sequa-ai sequa-mcp versions up to 1.0.13. The vulnerability affects the redirectToAuthorization function in the src/helpers/node-oauth-client-provider.ts file of the OAuth Server Discovery component. The vulnerability was disclosed on September 17, 2025, and received a CVSS v3.1 base score of 6.3 (Medium) (NVD, Miggo).

Technical details

The vulnerability stems from improper validation of the authorizationUrl parameter in the redirectToAuthorization method of the NodeOauthClientProvider class. The function uses the open library without properly validating the input URL, allowing potential execution of shell commands. The vulnerability has been assigned CWE-78 (OS Command Injection) and CWE-77 (Command Injection). The CVSS vector string is CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L, indicating network accessibility with low attack complexity (Miggo).

Impact

The vulnerability allows remote attackers to execute arbitrary operating system commands on affected systems through specially crafted URLs. This could lead to unauthorized access, data manipulation, and system compromise with the privileges of the application running the vulnerable component (NVD).

Mitigation and workarounds

The vulnerability has been patched in version 1.0.14 of sequa-mcp. The fix implements proper URL validation to ensure that only valid web URLs (starting with 'http://' or 'https://') can be processed by the redirectToAuthorization function. Users are strongly recommended to upgrade to version 1.0.14 or later (GitHub).

Community reactions

The vendor acknowledged the security issue, stating: "We only promote that mcp server with our own URLs that have a valid response, but yes if someone would use it with a non sequa url, this is a valid attack vector. We have released a new version (1.0.14) that fixes this and validates that only URLs can be opened" (NVD).

Additional resources


SourceThis report was generated using AI

Related JavaScript vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

GHSA-w5fx-fh39-j5rwHIGH8.6
  • JavaScriptJavaScript
  • @openai/codex
NoYesSep 19, 2025
CVE-2025-59417MEDIUM6.8
  • JavaScriptJavaScript
  • @lobehub/chat
NoYesSep 18, 2025
CVE-2025-59717MEDIUM5.4
  • JavaScriptJavaScript
  • @digitalocean/do-markdownit
NoNoSep 19, 2025
CVE-2025-10619MEDIUM5.3
  • JavaScriptJavaScript
  • @sequa-ai/sequa-mcp
NoYesSep 17, 2025
CVE-2025-59427LOW2.9
  • JavaScriptJavaScript
  • @cloudflare/vite-plugin
NoYesSep 19, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management