CVE-2025-35028
By · By providing a Multiple Products
A critical vulnerability has been identified in the HexStrike AI MCP server, which allows an unauthenticated attacker to execute arbitrary commands with the highest system privileges (root).
Executive summary
A critical vulnerability has been identified in the HexStrike AI MCP server, which allows an unauthenticated attacker to execute arbitrary commands with the highest system privileges (root). This is achieved by sending a specially crafted command-line argument to a specific API endpoint, potentially leading to a complete compromise of the affected server and significant risk to the organization's data and network infrastructure.
Vulnerability
This is a command injection vulnerability within the EnhancedCommandExecutor class of the HexStrike AI MCP server. The server exposes an API endpoint that accepts command-line arguments. Due to improper input sanitization, an attacker can provide an argument that begins with a semicolon (;). The server software concatenates this malicious input directly into a system command string, where the semicolon acts as a command separator, allowing the attacker's subsequent string to be executed as a new, independent command. This command runs with the full privileges of the MCP server process, which is typically the root user, granting the attacker complete control over the underlying operating system.
Business impact
This vulnerability is rated as critical severity with a CVSS score of 9.1, reflecting the extreme risk it poses. Successful exploitation would grant an attacker full administrative control over the affected server. Potential consequences include theft, modification, or destruction of sensitive data; deployment of ransomware or other malware; complete disruption of services relying on the MCP server; and using the compromised server as a pivot point to launch further attacks against the internal network. The business impact includes severe reputational damage, financial loss from operational downtime and incident response, and potential regulatory fines related to data breaches.
Remediation
Immediate Action: The primary remediation is to apply the security patches provided by the vendor immediately. Upgrade all instances of "By providing a Multiple Products" to the latest, non-vulnerable version as soon as possible, prioritizing internet-facing systems.
Proactive Monitoring: Security teams should actively monitor for signs of exploitation. Review API and web server access logs for any requests to the affected endpoint where command-line arguments begin with a semicolon (;) or contain other shell metacharacters (e.g., |, &&, $()). Monitor system-level logs for suspicious processes being spawned by the MCP server process, unexpected outbound network connections, or unauthorized file modifications.
Compensating Controls: If patching cannot be performed immediately, implement the following temporary controls:
- Deploy a Web Application Firewall (WAF) or Intrusion Prevention System (IPS) rule to inspect and block incoming API requests that contain patterns indicative of this attack (e.g.,
;at the start of the specific argument). - Restrict network access to the vulnerable API endpoint to only trusted IP addresses.
- If possible, run the MCP server process with a dedicated, low-privilege service account instead of
rootto limit the impact of a potential compromise.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Given the critical severity (CVSS 9.1) and the potential for complete system compromise via remote command execution, this vulnerability represents a severe and immediate threat. We strongly recommend that organizations treat this as an emergency and apply the vendor-supplied patches to all affected systems without delay. All internet-facing instances of the HexStrike AI MCP server must be prioritized for immediate remediation. Until patching is complete, the compensating controls listed above should be implemented to reduce the attack surface.