Home

Description

EN DE

A vulnerability was detected in sequa-ai sequa-mcp up to 1.0.13. This affects the function redirectToAuthorization of the file src/helpers/node-oauth-client-provider.ts of the component OAuth Server Discovery. Performing manipulation results in os command injection. Remote exploitation of the attack is possible. The exploit is now public and may be used. Upgrading to version 1.0.14 is able to mitigate this issue. The patch is named e569815854166db5f71c2e722408f8957fb9e804. It is recommended to upgrade the affected component. The vendor explains: "We only promote that mcp server with our own URLs that have a valid response, but yes if someone would use it with a non sequa url, this is a valid attack vector. We have released a new version (1.0.14) that fixes this and validates that only URLs can be opened."

In sequa-ai sequa-mcp bis 1.0.13 wurde eine Schwachstelle gefunden. Es ist betroffen die Funktion redirectToAuthorization der Datei src/helpers/node-oauth-client-provider.ts der Komponente OAuth Server Discovery. Dank der Manipulation mit unbekannten Daten kann eine os command injection-Schwachstelle ausgenutzt werden. Es ist möglich, den Angriff aus der Ferne durchzuführen. Der Exploit wurde der Öffentlichkeit bekannt gemacht und könnte verwendet werden. Ein Upgrade auf Version 1.0.14 ist in der Lage, dieses Problem zu adressieren. Der Patch heisst e569815854166db5f71c2e722408f8957fb9e804. Es wird empfohlen, die betroffene Komponente zu aktualisieren.

PUBLISHED Reserved 2025-09-17 | Published 2025-09-17 | Updated 2025-09-18 | Assigner VulDB




MEDIUM: 5.3CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
MEDIUM: 6.3CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
MEDIUM: 6.3CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
6.5AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C

Problem types

OS Command Injection

Command Injection

Product status

1.0.0
affected

1.0.1
affected

1.0.2
affected

1.0.3
affected

1.0.4
affected

1.0.5
affected

1.0.6
affected

1.0.7
affected

1.0.8
affected

1.0.9
affected

1.0.10
affected

1.0.11
affected

1.0.12
affected

1.0.13
affected

1.0.14
unaffected

Timeline

2025-09-17:Advisory disclosed
2025-09-17:VulDB entry created
2025-09-17:VulDB entry last update

Credits

yhryhryhr_ (VulDB User) reporter

References

lavender-bicycle-a5a.notion.site/...781f807da1c0cd158f9e3e1a exploit

vuldb.com/?id.324646 (VDB-324646 | sequa-ai sequa-mcp OAuth Server Discovery node-oauth-client-provider.ts redirectToAuthorization os command injection) vdb-entry technical-description

vuldb.com/?ctiid.324646 (VDB-324646 | CTI Indicators (IOB, IOC, TTP, IOA)) signature permissions-required

vuldb.com/?submit.650189 (Submit #650189 | Github https://github.com/sequa-ai/sequa-mcp 0.0.1 OS Command Injection) third-party-advisory

lavender-bicycle-a5a.notion.site/...f9e3e1a?source=copy_link exploit

github.com/...ommit/e569815854166db5f71c2e722408f8957fb9e804 patch

cve.org (CVE-2025-10619)

nvd.nist.gov (CVE-2025-10619)

Download JSON