Home

Description

WeKnora is an LLM-powered framework designed for deep document understanding and semantic retrieval. Prior to version 0.2.5, there is a command injection vulnerability that allows authenticated users to inject stdio_config.command/args into MCP stdio settings, causing the server to execute subprocesses using these injected values. This issue has been patched in version 0.2.5.

PUBLISHED Reserved 2026-01-08 | Published 2026-01-10 | Updated 2026-01-12 | Assigner GitHub_M




CRITICAL: 10.0CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

Problem types

CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')

Product status

< 0.2.5
affected

References

github.com/...eKnora/security/advisories/GHSA-78h3-63c4-5fqc exploit

github.com/...eKnora/security/advisories/GHSA-78h3-63c4-5fqc

github.com/...ommit/f7900a5e9a18c99d25cec9589ead9e4e59ce04bb

cve.org (CVE-2026-22688)

nvd.nist.gov (CVE-2026-22688)

Download JSON