AI description
CVE-2025-49596 affects MCP Inspector versions below 0.14.1. The vulnerability stems from a lack of authentication between the Inspector client and proxy. This allows unauthenticated requests to launch MCP commands over stdio. Specifically, the absence of authentication allows an attacker to potentially execute arbitrary remote commands on the MCP server. The vulnerability can be exploited remotely and doesn't require authentication. To remediate this vulnerability, users should upgrade to MCP Inspector version 0.14.1 or later.
- Description
- The MCP inspector is a developer tool for testing and debugging MCP servers. Versions of MCP Inspector below 0.14.1 are vulnerable to remote code execution due to lack of authentication between the Inspector client and proxy, allowing unauthenticated requests to launch MCP commands over stdio. Users should immediately upgrade to version 0.14.1 or later to address these vulnerabilities.
- Source
- security-advisories@github.com
- NVD status
- Awaiting Analysis
CVSS 4.0
- Type
- Secondary
- Base score
- 9.4
- Impact score
- -
- Exploitability score
- -
- Vector string
- CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
- Severity
- CRITICAL
- security-advisories@github.com
- CWE-306
- Hype score
- Not currently trending
#VulnerabilityReport #0000day Critical RCE in MCP Inspector Exposes AI Devs to Web-Based Exploits (CVE-2025-49596) https://t.co/IQhqJTDYlU
@Komodosec
6 Aug 2025
8 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
MCP Inspector (CVE-2025-49596): localhost/DNS-rebind can yield RCE in default setups. Fix: upgrade to 0.14.1 or later. Don’t expose dev tools without auth. #MCP #Security #AppSec https://t.co/ceDi487clt
@DeepEngineerHub
5 Aug 2025
35 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
#VulnerabilityReport #AIDevelopment CVE-2025-49596: Critical RCE Vulnerability in MCP Inspector Exposes AI Developer Environments https://t.co/D7GvwSY9op
@Komodosec
24 Jul 2025
24 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Want to stay protected? Use $SIGIL's AI MCP A recent critical vulnerability (CVE-2025-49596) in Anthropic’s MCP Inspector exposed AI developers to remote code execution risks, allowing attackers to run arbitrary commands on developer machines through unauthenticated MCP serve
@Sigil_AI
10 Jul 2025
4592 Impressions
30 Retweets
107 Likes
0 Bookmarks
20 Replies
0 Quotes
Falha RCE em Anthropic MCP Inspector (CVE-2025-49596) permitia execução remota explorando type confusion no proxy server. Explorar consistia em enviar payloads MCP maliciosos que eram interpretados sem sanitização, abrindo shell no host de desenvolvimento.
@hashtagsec
10 Jul 2025
35 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 CVE-2025-49596 (CVSS 9.4): Anthropic MCP Inspector <0.14.1 vulnerable to unauth RCE via CSRF/DNS-rebind. A malicious website hitting localhost = shell. Update to 0.14.1+ & add auth now. More: https://t.co/2cXf3o89OV #CVE202549596 #AppSec #CloudSecurity
@empherehq
9 Jul 2025
4 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 Critical Security Alert: A vulnerability in Anthropic’s MCP Inspector (CVE-2025-49596) allows remote code execution, posing risks to developers and businesses. While patched, this highlights the need for robust security in AI tools, especially for accessibility application
@triepod_ai
8 Jul 2025
43 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 Critical Security Alert: A vulnerability in Anthropic’s MCP Inspector (CVE-2025-49596) allows remote code execution, posing risks to developers and businesses. While patched, this highlights the need for robust security in AI tools, especially for accessibility application
@triepod_ai
8 Jul 2025
5 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 Critical Security Alert: A vulnerability in Anthropic’s MCP Inspector (CVE-2025-49596) allows remote code execution, posing risks to developers and businesses. While patched, this highlights the need for robust security in AI tools, especially for accessibility application
@triepod_ai
8 Jul 2025
6 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 Critical Security Alert: A vulnerability in Anthropic’s MCP Inspector (CVE-2025-49596) allows remote code execution, posing risks to developers and businesses. While patched, this highlights the need for robust security in AI tools, especially for accessibility application
@triepod_ai
8 Jul 2025
7 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Security Alert: Critical Vulnerabilities in Anthropic's MCP Developments 🚨 Critical Vulnerability in MCP Inspector (CVE-2025-49596)A Remote Code Execution (RCE) flaw was found in versions below 0.14.1. Attackers could execute code on developer machines, risking assistive https
@triepod_ai
7 Jul 2025
37 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Critical RCE Vulnerability in Anthropic MCP Inspector - CVE-2025-49596 https://t.co/7tjIVgfuyA
@Dinosn
6 Jul 2025
3430 Impressions
8 Retweets
27 Likes
16 Bookmarks
1 Reply
2 Quotes
Security researchers have identified a critical vulnerability (CVE-2025-49596, CVSS 9.4) in Anthropic’s MCP Inspector that could enable remote code execution and complete host takeover.
@S84788Aicores
6 Jul 2025
41 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
CVE-2025-49596: The MCP inspector is a developer tool for testing MCP servers. Versions below 0.14.1 are vulnerable to remote code execution due to lack of authentication between the Inspector client and proxy, allowing unauthenticated requests to launch MCP commands over stdio
@ZeroDayFacts
5 Jul 2025
4 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Critical RCE Vulnerability in Anthropic MCP Inspector - CVE-2025-49596 https://t.co/XeuIrTffSL #machinelearning #ai
@eyalestrin
3 Jul 2025
19 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-49596: vulnerabilità RCE in Anthropic MCP Inspector espone a exploit via browser Vulnerabilità, AI, Anthropic, browser, evidenza, exploit, MCP Inspector, rce https://t.co/2ASfE3Y02x https://t.co/c53fjJjYQD
@matricedigitale
2 Jul 2025
19 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Critical vulnerability in Anthropic's MCP Inspector (CVE-2025-49596) - attackers can run remote code and take full control of dev machines. The issue is insecure default settings. Attackers trick devs into visiting malicious sites through browser flaws/CSRF, then execute https:/
@Hankyone
2 Jul 2025
65 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-49596 : Critical RCE in Anthropic MCP Inspector Enables Browser-Based Exploits https://t.co/6iuuGfmDck https://t.co/bKLv0oyXMq
@freedomhack101
2 Jul 2025
41 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
🗞️ A critical remote code execution (RCE) vulnerability (CVE-2025-49596) has been discovered in Anthropic's Model Context Protocol (MCP) Inspector, allowing attackers to gain complete control over developer machines. Key takeaways: 🧵 https://t.co/GoVTTKGXnn
@gossy_84
2 Jul 2025
68 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
01/07/2025 Critical vulnerability in Anthropic's MCP could lead to RCE, granting attackers full access to developer machines. CVE-2025-49596, CVSS 9.4/10. Immediate action recommended! 🚨 Source: https://t.co/p1rx2ff6Ms
@kernyx64
2 Jul 2025
35 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨Alert🚨 CVE-2025-49596:Critical RCE Vulnerability in Anthropic MCP Inspector 🧐Deep Dive from @avi_lum : https://t.co/R9LGzBIqVy 📊137 Services are found on the https://t.co/ysWb28Crld yearly. 🔗Hunter Link:https://t.co/fpNmOaZFdB 👇Query HUNTER : https://t.co/q9rtu
@HunterMapping
2 Jul 2025
2901 Impressions
12 Retweets
36 Likes
9 Bookmarks
2 Replies
0 Quotes
Critical RCE in Anthropic MCP Inspector (CVE-2025-49596) Enables Browser-Based Exploits | Oligo Security https://t.co/oXJrhKiBZs https://t.co/d8IVEwpRPQ
@secharvesterx
1 Jul 2025
37 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-49596: Critical RCE in Anthropic MCP Inspector I stumbled across a nasty 0day in Anthropic’s official MCP Inspector. Turns out: any public website could have exploited it to run arbitrary bash commands. https://t.co/VuXeUJWvOD
@avi_lum
30 Jun 2025
4399 Impressions
6 Retweets
47 Likes
28 Bookmarks
4 Replies
0 Quotes
🟥 CVE-2025-49596, CVSS: 9.4 (#Critical) #MCP Inspector version < 0.14.1 #Vulnerability allows remote code execution due to lack of authentication between the Inspector client and proxy. #CyberSecurity #CVE #RemoteCodeExecution #MCPInspector https://t.co/k7ZDYm3drw htt
@UjlakiMarci
14 Jun 2025
1159 Impressions
8 Retweets
17 Likes
7 Bookmarks
1 Reply
0 Quotes
🚨 CRITICAL: CVE-2025-49596 in MCP Inspector (<0.14.1) lets unauth attackers execute remote code! Patch ASAP. No exploits yet. https://t.co/DOaoaqWZ86 #OffSeq #CVE2025 #infosec https://t.co/GqZr0cmubK
@offseq
14 Jun 2025
37 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[CVE-2025-49596: CRITICAL] MCP Inspector versions below 0.14.1 are vulnerable to remote code execution due to lack of authentication. Upgrade to version 0.14.1 or later to secure your servers. #cybersecurity#cve,CVE-2025-49596,#cybersecurity https://t.co/iyrX0AhRxx https://t.co/C
@CveFindCom
13 Jun 2025
41 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-49596 The MCP inspector is a developer tool for testing and debugging MCP servers. Versions of MCP Inspector below 0.14.1 are vulnerable to remote code execution due to lac… https://t.co/ar0nqaAEBt
@CVEnew
13 Jun 2025
778 Impressions
1 Retweet
2 Likes
0 Bookmarks
0 Replies
0 Quotes