CVE-2025-49596

Published Jun 13, 2025

Last updated 3 months ago

CVSS critical 9.4
MCP Inspector

Overview

AI description

Automated description summarized from trusted sources.

CVE-2025-49596 affects MCP Inspector versions below 0.14.1. The vulnerability stems from a lack of authentication between the Inspector client and proxy. This allows unauthenticated requests to launch MCP commands over stdio. Specifically, the absence of authentication allows an attacker to potentially execute arbitrary remote commands on the MCP server. The vulnerability can be exploited remotely and doesn't require authentication. To remediate this vulnerability, users should upgrade to MCP Inspector version 0.14.1 or later.

Description
The MCP inspector is a developer tool for testing and debugging MCP servers. Versions of MCP Inspector below 0.14.1 are vulnerable to remote code execution due to lack of authentication between the Inspector client and proxy, allowing unauthenticated requests to launch MCP commands over stdio. Users should immediately upgrade to version 0.14.1 or later to address these vulnerabilities.
Source
security-advisories@github.com
NVD status
Awaiting Analysis

Risk scores

CVSS 4.0

Type
Secondary
Base score
9.4
Impact score
-
Exploitability score
-
Vector string
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Severity
CRITICAL

Weaknesses

security-advisories@github.com
CWE-306

Social media

Hype score
Not currently trending
  1. Descubre las lecciones de seguridad en #Docker sobre CVE-2025-49596. ¡No te lo pierdas! https://t.co/2sTFimIEXu #Ciberseguridad

    @AlejosAngel

    28 Sept 2025

    36 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  2. Amazing blog article: Invisible Dangers: How CVE-2025-49596 Exposed a Critical Flaw in MCP Inspector! Check it live: https://t.co/yduavJNxKX

    @dubaitechworld

    27 Sept 2025

    39 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  3. Critical MCP server vulnerability CVE-2025-49596 allows host machine takeover via a malicious link click, bypassing container security. #CVE202549596 #MCPVulnerability #DriveByBreach https://t.co/G1qPN9mKhc

    @turtlen3ws

    24 Sept 2025

    37 Impressions

    1 Retweet

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  4. CVE-2025-49596 illustrates a dangerous flaw in AI development environments: trusted tools like MCP Inspector can be weaponized against developers. This vulnerability not only endangers codebases but also heightens the need for enterprise security protocols.

    @veruleanBlog

    23 Sept 2025

    34 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  5. ⚠️ MCP Horror Stories Issue 4 is out. A critical vulnerability in MCP Inspector (CVE-2025-49596) turns localhost into an attack surface. One browser tab is all it takes. Read the full story by @ajeetsraina: https://t.co/tm7LHfzNaL https://t.co/9G5h0qFPbN

    @Docker

    23 Sept 2025

    5651 Impressions

    7 Retweets

    24 Likes

    7 Bookmarks

    2 Replies

    1 Quote

  6. Dragon Drop: NEW Releases 🚨🐉 ☁️ New AWS Cloud lab: → Defensive Cloud - Pastel Green Store: https://t.co/pWaPwCNtQF 🪲 New CVE labs: → CVE-2025-49596: https://t.co/HUovx1NkFO → CVE-2025–52921: https://t.co/h8LVE5WHcC → CVE-2025-2067: https://t.co/Ls61ymol9O

    @offsectraining

    29 Aug 2025

    3273 Impressions

    1 Retweet

    29 Likes

    10 Bookmarks

    1 Reply

    0 Quotes

  7. #VulnerabilityReport #0000day Critical RCE in MCP Inspector Exposes AI Devs to Web-Based Exploits (CVE-2025-49596) https://t.co/IQhqJTDYlU

    @Komodosec

    6 Aug 2025

    8 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  8. MCP Inspector (CVE-2025-49596): localhost/DNS-rebind can yield RCE in default setups. Fix: upgrade to 0.14.1 or later. Don’t expose dev tools without auth. #MCP #Security #AppSec https://t.co/ceDi487clt

    @DeepEngineerHub

    5 Aug 2025

    35 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  9. #VulnerabilityReport #AIDevelopment CVE-2025-49596: Critical RCE Vulnerability in MCP Inspector Exposes AI Developer Environments https://t.co/D7GvwSY9op

    @Komodosec

    24 Jul 2025

    24 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  10. Want to stay protected? Use $SIGIL's AI MCP A recent critical vulnerability (CVE-2025-49596) in Anthropic’s MCP Inspector exposed AI developers to remote code execution risks, allowing attackers to run arbitrary commands on developer machines through unauthenticated MCP serve

    @Sigil_AI

    10 Jul 2025

    4592 Impressions

    30 Retweets

    107 Likes

    0 Bookmarks

    20 Replies

    0 Quotes

  11. Falha RCE em Anthropic MCP Inspector (CVE-2025-49596) permitia execução remota explorando type confusion no proxy server. Explorar consistia em enviar payloads MCP maliciosos que eram interpretados sem sanitização, abrindo shell no host de desenvolvimento.

    @hashtagsec

    10 Jul 2025

    35 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  12. 🚨 CVE-2025-49596 (CVSS 9.4): Anthropic MCP Inspector <0.14.1 vulnerable to unauth RCE via CSRF/DNS-rebind. A malicious website hitting localhost = shell. Update to 0.14.1+ & add auth now. More: https://t.co/2cXf3o89OV #CVE202549596 #AppSec #CloudSecurity

    @empherehq

    9 Jul 2025

    4 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  13. 🚨 Critical Security Alert: A vulnerability in Anthropic’s MCP Inspector (CVE-2025-49596) allows remote code execution, posing risks to developers and businesses. While patched, this highlights the need for robust security in AI tools, especially for accessibility application

    @triepod_ai

    8 Jul 2025

    43 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  14. 🚨 Critical Security Alert: A vulnerability in Anthropic’s MCP Inspector (CVE-2025-49596) allows remote code execution, posing risks to developers and businesses. While patched, this highlights the need for robust security in AI tools, especially for accessibility application

    @triepod_ai

    8 Jul 2025

    5 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  15. 🚨 Critical Security Alert: A vulnerability in Anthropic’s MCP Inspector (CVE-2025-49596) allows remote code execution, posing risks to developers and businesses. While patched, this highlights the need for robust security in AI tools, especially for accessibility application

    @triepod_ai

    8 Jul 2025

    6 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  16. 🚨 Critical Security Alert: A vulnerability in Anthropic’s MCP Inspector (CVE-2025-49596) allows remote code execution, posing risks to developers and businesses. While patched, this highlights the need for robust security in AI tools, especially for accessibility application

    @triepod_ai

    8 Jul 2025

    7 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  17. Security Alert: Critical Vulnerabilities in Anthropic's MCP Developments 🚨 Critical Vulnerability in MCP Inspector (CVE-2025-49596)A Remote Code Execution (RCE) flaw was found in versions below 0.14.1. Attackers could execute code on developer machines, risking assistive https

    @triepod_ai

    7 Jul 2025

    37 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  18. Critical RCE Vulnerability in Anthropic MCP Inspector - CVE-2025-49596 https://t.co/7tjIVgfuyA

    @Dinosn

    6 Jul 2025

    3430 Impressions

    8 Retweets

    27 Likes

    16 Bookmarks

    1 Reply

    2 Quotes

  19. Security researchers have identified a critical vulnerability (CVE-2025-49596, CVSS 9.4) in Anthropic’s MCP Inspector that could enable remote code execution and complete host takeover.

    @S84788Aicores

    6 Jul 2025

    41 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  20. CVE-2025-49596: The MCP inspector is a developer tool for testing MCP servers. Versions below 0.14.1 are vulnerable to remote code execution due to lack of authentication between the Inspector client and proxy, allowing unauthenticated requests to launch MCP commands over stdio

    @ZeroDayFacts

    5 Jul 2025

    4 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  21. Critical RCE Vulnerability in Anthropic MCP Inspector - CVE-2025-49596 https://t.co/XeuIrTffSL #machinelearning #ai

    @eyalestrin

    3 Jul 2025

    19 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  22. CVE-2025-49596: vulnerabilità RCE in Anthropic MCP Inspector espone a exploit via browser Vulnerabilità, AI, Anthropic, browser, evidenza, exploit, MCP Inspector, rce https://t.co/2ASfE3Y02x https://t.co/c53fjJjYQD

    @matricedigitale

    2 Jul 2025

    19 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  23. Critical vulnerability in Anthropic's MCP Inspector (CVE-2025-49596) - attackers can run remote code and take full control of dev machines. The issue is insecure default settings. Attackers trick devs into visiting malicious sites through browser flaws/CSRF, then execute https:/

    @Hankyone

    2 Jul 2025

    65 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  24. CVE-2025-49596 : Critical RCE in Anthropic MCP Inspector Enables Browser-Based Exploits https://t.co/6iuuGfmDck https://t.co/bKLv0oyXMq

    @freedomhack101

    2 Jul 2025

    41 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  25. 🗞️ A critical remote code execution (RCE) vulnerability (CVE-2025-49596) has been discovered in Anthropic's Model Context Protocol (MCP) Inspector, allowing attackers to gain complete control over developer machines. Key takeaways: 🧵 https://t.co/GoVTTKGXnn

    @gossy_84

    2 Jul 2025

    68 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  26. 01/07/2025 Critical vulnerability in Anthropic's MCP could lead to RCE, granting attackers full access to developer machines. CVE-2025-49596, CVSS 9.4/10. Immediate action recommended! 🚨 Source: https://t.co/p1rx2ff6Ms

    @kernyx64

    2 Jul 2025

    35 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  27. 🚨Alert🚨 CVE-2025-49596:Critical RCE Vulnerability in Anthropic MCP Inspector 🧐Deep Dive from @avi_lum : https://t.co/R9LGzBIqVy 📊137 Services are found on the https://t.co/ysWb28Crld yearly. 🔗Hunter Link:https://t.co/fpNmOaZFdB 👇Query HUNTER : https://t.co/q9rtu

    @HunterMapping

    2 Jul 2025

    2901 Impressions

    12 Retweets

    36 Likes

    9 Bookmarks

    2 Replies

    0 Quotes

  28. Critical RCE in Anthropic MCP Inspector (CVE-2025-49596) Enables Browser-Based Exploits | Oligo Security https://t.co/oXJrhKiBZs https://t.co/d8IVEwpRPQ

    @secharvesterx

    1 Jul 2025

    37 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  29. CVE-2025-49596: Critical RCE in Anthropic MCP Inspector I stumbled across a nasty 0day in Anthropic’s official MCP Inspector. Turns out: any public website could have exploited it to run arbitrary bash commands. https://t.co/VuXeUJWvOD

    @avi_lum

    30 Jun 2025

    4399 Impressions

    6 Retweets

    47 Likes

    28 Bookmarks

    4 Replies

    0 Quotes

  30. 🟥 CVE-2025-49596, CVSS: 9.4 (#Critical) #MCP Inspector version < 0.14.1 #Vulnerability allows remote code execution due to lack of authentication between the Inspector client and proxy. #CyberSecurity #CVE #RemoteCodeExecution #MCPInspector https://t.co/k7ZDYm3drw htt

    @UjlakiMarci

    14 Jun 2025

    1159 Impressions

    8 Retweets

    17 Likes

    7 Bookmarks

    1 Reply

    0 Quotes

  31. 🚨 CRITICAL: CVE-2025-49596 in MCP Inspector (<0.14.1) lets unauth attackers execute remote code! Patch ASAP. No exploits yet. https://t.co/DOaoaqWZ86 #OffSeq #CVE2025 #infosec https://t.co/GqZr0cmubK

    @offseq

    14 Jun 2025

    37 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  32. [CVE-2025-49596: CRITICAL] MCP Inspector versions below 0.14.1 are vulnerable to remote code execution due to lack of authentication. Upgrade to version 0.14.1 or later to secure your servers. #cybersecurity#cve,CVE-2025-49596,#cybersecurity https://t.co/iyrX0AhRxx https://t.co/C

    @CveFindCom

    13 Jun 2025

    41 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  33. CVE-2025-49596 The MCP inspector is a developer tool for testing and debugging MCP servers. Versions of MCP Inspector below 0.14.1 are vulnerable to remote code execution due to lac… https://t.co/ar0nqaAEBt

    @CVEnew

    13 Jun 2025

    778 Impressions

    1 Retweet

    2 Likes

    0 Bookmarks

    0 Replies

    0 Quotes