HomeTencentCVE-2026-30861

CVE-2026-30861

CRITICAL
9.9CVSS
Published: 2026-03-07
Updated: 2026-03-09
AI Analysis

Description

WeKnora is an LLM-powered framework designed for deep document understanding and semantic retrieval. From version 0.2.5 to before version 0.2.10, an unauthenticated remote code execution (RCE) vulnerability exists in the MCP stdio configuration validation. The application allows unrestricted user registration, meaning any attacker can create an account and exploit the command injection flaw. Despite implementing a whitelist for allowed commands (npx, uvx) and blacklists for dangerous arguments and environment variables, the validation can be bypassed using the -p flag with npx node. This allows any attacker to execute arbitrary commands with the application's privileges, leading to complete system compromise. This issue has been patched in version 0.2.10.

CVSS Metrics

Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Attack Vector
network
Complexity
low
Privileges
low
User Action
none
Scope
changed
Confidentiality
high
Integrity
high
Availability
high
Weaknesses
CWE-78

Metadata

Primary Vendor
TENCENT
Published
3/7/2026
Last Modified
3/9/2026
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

tencent : weknora

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2026-30861 | CRITICAL Severity | CVEDatabase.com | CVEDatabase.com