CVE-2026-30861

WeKnora · WeKnora LLM Framework

An unauthenticated remote code execution vulnerability in WeKnora allows attackers to bypass command validation using the -p flag in npx node, leading to complete system compromise.

Executive summary

WeKnora is susceptible to a critical unauthenticated remote code execution vulnerability that allows attackers to execute arbitrary commands with full application privileges.

Vulnerability

The vulnerability is located in the MCP stdio configuration validation. An unauthenticated remote attacker can bypass existing blacklists and whitelists by using the -p flag with npx node to execute arbitrary commands on the underlying server.

Business impact

This flaw poses an extreme risk to data confidentiality, integrity, and availability. Successful exploitation grants the attacker the same privileges as the application, enabling them to steal sensitive documents, modify data, or move laterally within the network. The CVSS score of 9.9 underscores the critical risk associated with unauthenticated RCE.

Remediation

Immediate Action: Upgrade WeKnora to version 0.2.10 or later to apply the necessary validation fixes.

Proactive Monitoring: Audit application logs for suspicious npx or uvx command executions and monitor for unauthorized user registrations.

Compensating Controls: Implement strict network egress filtering to prevent the application from communicating with malicious external servers during a potential exploit.

Exploitation status

Public Exploit Available: true

Analyst recommendation

Given the unauthenticated nature of this RCE and the high CVSS score, this vulnerability must be treated as a top priority. Organizations using WeKnora should update to version 0.2.10 immediately to mitigate the risk of total system takeover.