GHSA-p4h8-56qp-hpgv

GHSA-p4h8-56qp-hpgv HIGH
Published April 14, 2026

## Impact A crafted `hostAlias` argument such as `-oProxyCommand=...` was passed to `ssh`/`scp` without an argument terminator. SSH interprets arguments starting with `-` as options regardless of position, so the option-injection caused SSH to execute the attacker-supplied `ProxyCommand`...

Full CISO analysis pending enrichment.

Affected Systems

Package Ecosystem Vulnerable Range Patched
@aiondadotcom/mcp-ssh npm < 1.3.5 1.3.5

Do you use @aiondadotcom/mcp-ssh? You're affected.

Severity & Risk

CVSS 3.1
N/A
EPSS
N/A
Exploitation Status
No known exploitation
Sophistication
N/A

Recommended Action

Patch available

Update @aiondadotcom/mcp-ssh to version 1.3.5

Compliance Impact

Compliance analysis pending. Sign in for full compliance mapping when available.

Frequently Asked Questions

What is GHSA-p4h8-56qp-hpgv?

SSH/SCP option injection allowing local RCE in @aiondadotcom/mcp-ssh

Is GHSA-p4h8-56qp-hpgv actively exploited?

No confirmed active exploitation of GHSA-p4h8-56qp-hpgv has been reported, but organizations should still patch proactively.

How to fix GHSA-p4h8-56qp-hpgv?

Update to patched version: @aiondadotcom/mcp-ssh 1.3.5.

What is the CVSS score for GHSA-p4h8-56qp-hpgv?

No CVSS score has been assigned yet.

Technical Details

NVD Description

## Impact A crafted `hostAlias` argument such as `-oProxyCommand=...` was passed to `ssh`/`scp` without an argument terminator. SSH interprets arguments starting with `-` as options regardless of position, so the option-injection caused SSH to execute the attacker-supplied `ProxyCommand` **locally** on the machine running the MCP server — before any network connection. This bypassed the documented protection of `# @password:` annotations and exposed local SSH keys, browser cookies, other MCP server credentials, and anything else readable by the server process. A second local-RCE vector existed on Windows: `spawn(..., { shell: true })` was used so that `ssh.exe`/`scp.exe` could be found via `PATH`. With `shell: true`, every argument is re-parsed by `cmd.exe`, so shell metacharacters (`&`, `|`, `^`, `>`, `"`, `;`, …) in `hostAlias`, `command`, `localPath` or `remotePath` would have been interpreted by `cmd.exe` and could have triggered arbitrary local command execution on Windows. The MCP server runs locally over STDIO, but the LLM driving it is not trusted: its tool arguments can be steered by **prompt injection** from any untrusted text the LLM ingests (web pages, e-mails, repository files, output of other MCP servers). The attack does not require a malicious user — only that the LLM ingests attacker-controlled text at any point during the session. ## Patches Fixed in **1.3.5**. - Add `--` argument terminator to all `ssh`/`scp` invocations. - Strict whitelist for `hostAlias` (rejects leading `-` and shell metacharacters). - Known-host check: every `hostAlias` must be defined in `~/.ssh/config` (including `Include` directives) or present in `~/.ssh/known_hosts`. - Resolve `ssh.exe`/`scp.exe` to absolute paths and use `shell: false` everywhere on Windows. ## Workarounds None. Upgrade to 1.3.5. ## Credit Reported by Pico (@piiiico) as part of an MCP server security audit.

Timeline

Published
April 14, 2026
Last Modified
April 14, 2026
First Seen
April 14, 2026