Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-g9hg-qhmf-q45m

Опубликовано: 08 сент. 2025
Источник: github
Github: Прошло ревью
CVSS4: 8.6

Описание

MCP Inspector is Vulnerable to Potential Command Execution via XSS When Connecting to an Untrusted MCP Server

An XSS flaw exists in the MCP Inspector local development tool when it renders a redirect URL returned by a remote MCP server. If the Inspector connects to an untrusted server, a crafted redirect can inject script into the Inspector context and, via the built-in proxy, be leveraged to trigger arbitrary command execution on the developer machine. Version 0.16.6 hardens URL handling/validation and prevents script execution.

Thank you to the following researchers for their reports and contributions:

Пакеты

Наименование

@modelcontextprotocol/inspector

npm
Затронутые версииВерсия исправления

< 0.16.6

0.16.6

EPSS

Процентиль: 4%
0.0002
Низкий

8.6 High

CVSS4

Дефекты

CWE-79
CWE-84
CWE-94

Связанные уязвимости

nvd
5 месяцев назад

The MCP inspector is a developer tool for testing and debugging MCP servers. A cross-site scripting issue was reported in versions of the MCP Inspector local development tool prior to 0.16.6 when connecting to untrusted remote MCP servers with a malicious redirect URI. This could be leveraged to interact directly with the inspector proxy to trigger arbitrary command execution. Users are advised to update to 0.16.6 to resolve this issue.

EPSS

Процентиль: 4%
0.0002
Низкий

8.6 High

CVSS4

Дефекты

CWE-79
CWE-84
CWE-94