Vulnerability DatabaseGHSA-45qj-4xq3-3c45

GHSA-45qj-4xq3-3c45
JavaScript vulnerability analysis and mitigation

Overview

A command injection vulnerability (GHSA-45qj-4xq3-3c45) was discovered in mcp-markdownify-server's pptx-to-markdown tool, affecting versions <=0.0.1. The vulnerability, disclosed on September 2, 2025, stems from unsanitized input parameters within child_process.exec calls, allowing attackers to inject arbitrary system commands. The vulnerability has been assigned a high severity rating with a CVSS score of 7.5 (GitHub Advisory).

Technical details

The vulnerability exists in the MCP Server's pptx-to-markdown tool where user input is directly passed to childprocess.exec without proper sanitization. The vulnerable code constructs and executes shell commands using unvalidated user input within command-line strings, specifically in the markitdown method where filePath parameter is used directly in command execution. The vulnerability has been assigned CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H, indicating network attack vector, high complexity, no privileges required, and high impact on confidentiality, integrity, and availability (GitHub Advisory).

Impact

Successful exploitation of this vulnerability can lead to Remote Code Execution (RCE) under the server process's privileges. The vulnerability allows attackers to execute arbitrary system commands through shell metacharacter injection (|, >, &&, etc.), potentially compromising the entire system (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been patched in version 0.0.2. The recommended mitigation is to avoid using childprocess.exec with untrusted input and instead use childprocess.execFile, which allows passing arguments as a separate array to avoid shell interpretation. For handling tilde paths, it's recommended to use the untildify package to convert tilde paths to absolute paths before passing to child_process.execFile (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management