Description
A security flaw has been discovered in egtai gmx-vmd-mcp up to 0.1.0. This issue affects the function launch_vmd_gui_tool of the file mcp_server.py of the component VMD Launch Handler. The manipulation of the argument structure_file/trajectory_file results in command injection. The attack may be launched remotely. The exploit has been released to the public and may be used for attacks. The project was informed of the problem early through an issue report but has not responded yet.
Problem types
Product status
Timeline
| 2026-04-27: | Advisory disclosed |
| 2026-04-27: | VulDB entry created |
| 2026-04-27: | VulDB entry last update |
Credits
SmallW (VulDB User)
VulDB CNA Team
References
vuldb.com/vuln/359815 (VDB-359815 | egtai gmx-vmd-mcp VMD Launch mcp_server.py launch_vmd_gui_tool command injection)
vuldb.com/vuln/359815/cti (VDB-359815 | CTI Indicators (IOB, IOC, TTP, IOA))
vuldb.com/submit/802087 (Submit #802087 | egtai gmx-vmd-mcp 0.1.0 Command Injection)
github.com/egtai/gmx-vmd-mcp/issues/2
github.com/egtai/gmx-vmd-mcp/