orval generates type-safe JS clients (TypeScript) from any valid OpenAPI v3 or Swagger v2 specification. Prior to 7.18.0, the MCP server generation logic relies on string manipulation that incorporates the summary field from the OpenAPI specification without proper validation or escaping. This allows an attacker to "break out" of the string literal and inject arbitrary code. This vulnerability is fixed in 7.18.0.
Metrics
Affected Vendors & Products
References
History
Tue, 13 Jan 2026 09:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Orval-labs
Orval-labs orval |
|
| Vendors & Products |
Orval-labs
Orval-labs orval |
Mon, 12 Jan 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 12 Jan 2026 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | orval generates type-safe JS clients (TypeScript) from any valid OpenAPI v3 or Swagger v2 specification. Prior to 7.18.0, the MCP server generation logic relies on string manipulation that incorporates the summary field from the OpenAPI specification without proper validation or escaping. This allows an attacker to "break out" of the string literal and inject arbitrary code. This vulnerability is fixed in 7.18.0. | |
| Title | orval MCP client is vulnerable to a code injection attack. | |
| Weaknesses | CWE-77 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2026-01-12T18:43:16.637Z
Updated: 2026-01-12T18:56:50.902Z
Reserved: 2026-01-09T18:27:19.388Z
Link: CVE-2026-22785
Updated: 2026-01-12T18:56:47.592Z
Status : Awaiting Analysis
Published: 2026-01-12T19:16:04.287
Modified: 2026-01-13T14:03:18.990
Link: CVE-2026-22785
No data.