Описание
FastMCP vulnerable to windows command injection in FastMCP Cursor installer via server_name
Summary
A command-injection vulnerability lets any attacker who can influence the server_name field of an MCP execute arbitrary OS commands on Windows hosts that run fastmcp install cursor
Details
- generate_cursor_deeplink(server_name, …) embeds server_name verbatim in a cursor://…?name= query string.
- open_deeplink() is invoked with shell=True only on Windows. That calls cmd.exe /c start .
- Any cmd metacharacter inside server_name (&, |, >, ^, …) escapes the start command and spawns an attacker-chosen process.
PoC
server.py
then run in the terminal:
fastmcp install cursor server.py
Impact
OS Command / Shell Injection (CWE-78) Every Windows host that runs fastmcp install cursor is at risk. Developers on their local workstations, CI/CD agents and corporate build machines alike.
Пакеты
fastmcp
< 2.13.0
2.13.0
Связанные уязвимости
FastMCP is the standard framework for building MCP applications. Versions prior to 2.13.0, a command-injection vulnerability lets any attacker who can influence the server_name field of an MCP execute arbitrary OS commands on Windows hosts that run fastmcp install cursor. This vulnerability is fixed in 2.13.0.