godot-mcp has Command Injection via unsanitized projectPath
Description
Published to the GitHub Advisory Database
Feb 4, 2026
Reviewed
Feb 4, 2026
Published by the National Vulnerability Database
Feb 4, 2026
Last updated
Feb 8, 2026
Impact
A Command Injection vulnerability in godot-mcp allows remote code execution. The
executeOperationfunction passed user-controlled input (e.g.,projectPath) directly toexec(), which spawns a shell. An attacker could inject shell metacharacters like$(command)or&calcto execute arbitrary commands with the privileges of the MCP server process.This affects any tool that accepts
projectPath, includingcreate_scene,add_node,load_sprite, and others.Patches
Fixed in version 0.1.1 by switching from
exec()toexecFile(), which does not invoke a shell.Workarounds
None. Users should upgrade immediately.
Resources
References