
Cloud Vulnerability DB
A community-led vulnerabilities database
A command injection vulnerability (CVE-2025-10619) was discovered in sequa-ai sequa-mcp versions up to 1.0.13. The vulnerability affects the redirectToAuthorization function in the src/helpers/node-oauth-client-provider.ts file of the OAuth Server Discovery component. The vulnerability was disclosed on September 17, 2025, and received a CVSS v3.1 base score of 6.3 (Medium) (NVD, Miggo).
The vulnerability stems from improper validation of the authorizationUrl parameter in the redirectToAuthorization method of the NodeOauthClientProvider class. The function uses the open library without properly validating the input URL, allowing potential execution of shell commands. The vulnerability has been assigned CWE-78 (OS Command Injection) and CWE-77 (Command Injection). The CVSS vector string is CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L, indicating network accessibility with low attack complexity (Miggo).
The vulnerability allows remote attackers to execute arbitrary operating system commands on affected systems through specially crafted URLs. This could lead to unauthorized access, data manipulation, and system compromise with the privileges of the application running the vulnerable component (NVD).
The vulnerability has been patched in version 1.0.14 of sequa-mcp. The fix implements proper URL validation to ensure that only valid web URLs (starting with 'http://' or 'https://') can be processed by the redirectToAuthorization function. Users are strongly recommended to upgrade to version 1.0.14 or later (GitHub).
The vendor acknowledged the security issue, stating: "We only promote that mcp server with our own URLs that have a valid response, but yes if someone would use it with a non sequa url, this is a valid attack vector. We have released a new version (1.0.14) that fixes this and validates that only URLs can be opened" (NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."