{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-23882","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2026-01-16T21:02:02.901Z","datePublished":"2026-03-23T20:52:17.200Z","dateUpdated":"2026-03-24T15:59:02.803Z"},"containers":{"cna":{"title":"Blinko: Admin RCE - MCP Server Command Injection","problemTypes":[{"descriptions":[{"cweId":"CWE-78","lang":"en","description":"CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')","type":"CWE"}]}],"metrics":[{"cvssV4_0":{"attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"HIGH","userInteraction":"NONE","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"HIGH","vulnAvailabilityImpact":"HIGH","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","subAvailabilityImpact":"NONE","baseScore":8.6,"baseSeverity":"HIGH","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N","version":"4.0"}}],"references":[{"name":"https://github.com/blinkospace/blinko/security/advisories/GHSA-59r2-82p8-c56v","tags":["x_refsource_CONFIRM"],"url":"https://github.com/blinkospace/blinko/security/advisories/GHSA-59r2-82p8-c56v"},{"name":"https://github.com/blinkospace/blinko/commit/bef6b770743e87c630db2d00d7049dabd96bfe85","tags":["x_refsource_MISC"],"url":"https://github.com/blinkospace/blinko/commit/bef6b770743e87c630db2d00d7049dabd96bfe85"},{"name":"https://github.com/blinkospace/blinko/releases/tag/1.8.4","tags":["x_refsource_MISC"],"url":"https://github.com/blinkospace/blinko/releases/tag/1.8.4"}],"affected":[{"vendor":"blinkospace","product":"blinko","versions":[{"version":"< 1.8.4","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2026-03-23T20:52:17.200Z"},"descriptions":[{"lang":"en","value":"Blinko is an AI-powered card note-taking project. Prior to version 1.8.4, the MCP (Model Context Protocol) server creation function allows specifying arbitrary commands and arguments, which are executed when testing the connection. This issue has been patched in version 1.8.4."}],"source":{"advisory":"GHSA-59r2-82p8-c56v","discovery":"UNKNOWN"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-03-24T15:58:18.222613Z","id":"CVE-2026-23882","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-03-24T15:59:02.803Z"}}]}}