ghsa-g9hg-qhmf-q45m
Vulnerability from github
Published
2025-09-08 21:14
Modified
2025-09-26 17:07
Severity ?
VLAI Severity ?
Summary
MCP Inspector is Vulnerable to Potential Command Execution via XSS When Connecting to an Untrusted MCP Server
Details
An XSS flaw exists in the MCP Inspector local development tool when it renders a redirect URL returned by a remote MCP server. If the Inspector connects to an untrusted server, a crafted redirect can inject script into the Inspector context and, via the built-in proxy, be leveraged to trigger arbitrary command execution on the developer machine. Version 0.16.6 hardens URL handling/validation and prevents script execution.
Thank you to the following researchers for their reports and contributions: * Raymond (Veria Labs) * Gavin Zhong, superboyzjc@gmail.com & Shuyang Wang, swang@obsidiansecurity.com.
{ "affected": [ { "package": { "ecosystem": "npm", "name": "@modelcontextprotocol/inspector" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "0.16.6" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2025-58444" ], "database_specific": { "cwe_ids": [ "CWE-79", "CWE-84", "CWE-94" ], "github_reviewed": true, "github_reviewed_at": "2025-09-08T21:14:23Z", "nvd_published_at": "2025-09-08T22:15:34Z", "severity": "HIGH" }, "details": "An XSS flaw exists in the MCP Inspector local development tool when it renders a redirect URL returned by a remote MCP server. If the Inspector connects to an untrusted server, a crafted redirect can inject script into the Inspector context and, via the built-in proxy, be leveraged to trigger arbitrary command execution on the developer machine. Version 0.16.6 hardens URL handling/validation and prevents script execution.\n\n\u003e Thank you to the following researchers for their reports and contributions:\n\u003e * Raymond (Veria Labs)\n\u003e * Gavin Zhong, \u003csuperboyzjc@gmail.com\u003e \u0026 Shuyang Wang, \u003cswang@obsidiansecurity.com\u003e.", "id": "GHSA-g9hg-qhmf-q45m", "modified": "2025-09-26T17:07:01Z", "published": "2025-09-08T21:14:23Z", "references": [ { "type": "WEB", "url": "https://github.com/modelcontextprotocol/inspector/security/advisories/GHSA-g9hg-qhmf-q45m" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58444" }, { "type": "WEB", "url": "https://github.com/modelcontextprotocol/inspector/commit/650f3090d26344a672026b737d81586595bb1f60" }, { "type": "PACKAGE", "url": "https://github.com/modelcontextprotocol/inspector" }, { "type": "WEB", "url": "https://www.npmjs.com/package/@modelcontextprotocol/inspector/v/0.16.6" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", "type": "CVSS_V4" } ], "summary": "MCP Inspector is Vulnerable to Potential Command Execution via XSS When Connecting to an Untrusted MCP Server" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…