## Impact A crafted `hostAlias` argument such as `-oProxyCommand=...` was passed to `ssh`/`scp` without an argument terminator. SSH interprets arguments starting with `-` as options regardless of position, so the option-injection caused SSH to execute the attacker-supplied `ProxyCommand`...
Full CISO analysis pending enrichment.
Affected Systems
| Package | Ecosystem | Vulnerable Range | Patched |
|---|---|---|---|
| @aiondadotcom/mcp-ssh | npm | < 1.3.5 | 1.3.5 |
Do you use @aiondadotcom/mcp-ssh? You're affected.
Severity & Risk
Recommended Action
Patch available
Update @aiondadotcom/mcp-ssh to version 1.3.5
Compliance Impact
Compliance analysis pending. Sign in for full compliance mapping when available.
Frequently Asked Questions
What is GHSA-p4h8-56qp-hpgv?
SSH/SCP option injection allowing local RCE in @aiondadotcom/mcp-ssh
Is GHSA-p4h8-56qp-hpgv actively exploited?
No confirmed active exploitation of GHSA-p4h8-56qp-hpgv has been reported, but organizations should still patch proactively.
How to fix GHSA-p4h8-56qp-hpgv?
Update to patched version: @aiondadotcom/mcp-ssh 1.3.5.
What is the CVSS score for GHSA-p4h8-56qp-hpgv?
No CVSS score has been assigned yet.
Technical Details
NVD Description
## Impact A crafted `hostAlias` argument such as `-oProxyCommand=...` was passed to `ssh`/`scp` without an argument terminator. SSH interprets arguments starting with `-` as options regardless of position, so the option-injection caused SSH to execute the attacker-supplied `ProxyCommand` **locally** on the machine running the MCP server — before any network connection. This bypassed the documented protection of `# @password:` annotations and exposed local SSH keys, browser cookies, other MCP server credentials, and anything else readable by the server process. A second local-RCE vector existed on Windows: `spawn(..., { shell: true })` was used so that `ssh.exe`/`scp.exe` could be found via `PATH`. With `shell: true`, every argument is re-parsed by `cmd.exe`, so shell metacharacters (`&`, `|`, `^`, `>`, `"`, `;`, …) in `hostAlias`, `command`, `localPath` or `remotePath` would have been interpreted by `cmd.exe` and could have triggered arbitrary local command execution on Windows. The MCP server runs locally over STDIO, but the LLM driving it is not trusted: its tool arguments can be steered by **prompt injection** from any untrusted text the LLM ingests (web pages, e-mails, repository files, output of other MCP servers). The attack does not require a malicious user — only that the LLM ingests attacker-controlled text at any point during the session. ## Patches Fixed in **1.3.5**. - Add `--` argument terminator to all `ssh`/`scp` invocations. - Strict whitelist for `hostAlias` (rejects leading `-` and shell metacharacters). - Known-host check: every `hostAlias` must be defined in `~/.ssh/config` (including `Include` directives) or present in `~/.ssh/known_hosts`. - Resolve `ssh.exe`/`scp.exe` to absolute paths and use `shell: false` everywhere on Windows. ## Workarounds None. Upgrade to 1.3.5. ## Credit Reported by Pico (@piiiico) as part of an MCP server security audit.
AI Threat Alert