CVE-2025-49596

Published Jun 13, 2025

Last updated a month ago

CVSS critical 9.4
MCP Inspector

Overview

AI description

Automated description summarized from trusted sources.

CVE-2025-49596 affects MCP Inspector versions below 0.14.1. The vulnerability stems from a lack of authentication between the Inspector client and proxy. This allows unauthenticated requests to launch MCP commands over stdio. Specifically, the absence of authentication allows an attacker to potentially execute arbitrary remote commands on the MCP server. The vulnerability can be exploited remotely and doesn't require authentication. To remediate this vulnerability, users should upgrade to MCP Inspector version 0.14.1 or later.

Description
The MCP inspector is a developer tool for testing and debugging MCP servers. Versions of MCP Inspector below 0.14.1 are vulnerable to remote code execution due to lack of authentication between the Inspector client and proxy, allowing unauthenticated requests to launch MCP commands over stdio. Users should immediately upgrade to version 0.14.1 or later to address these vulnerabilities.
Source
security-advisories@github.com
NVD status
Awaiting Analysis

Risk scores

CVSS 4.0

Type
Secondary
Base score
9.4
Impact score
-
Exploitability score
-
Vector string
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Severity
CRITICAL

Weaknesses

security-advisories@github.com
CWE-306

Social media

Hype score
Not currently trending
  1. #VulnerabilityReport #0000day Critical RCE in MCP Inspector Exposes AI Devs to Web-Based Exploits (CVE-2025-49596) https://t.co/IQhqJTDYlU

    @Komodosec

    6 Aug 2025

    8 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  2. MCP Inspector (CVE-2025-49596): localhost/DNS-rebind can yield RCE in default setups. Fix: upgrade to 0.14.1 or later. Don’t expose dev tools without auth. #MCP #Security #AppSec https://t.co/ceDi487clt

    @DeepEngineerHub

    5 Aug 2025

    35 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  3. #VulnerabilityReport #AIDevelopment CVE-2025-49596: Critical RCE Vulnerability in MCP Inspector Exposes AI Developer Environments https://t.co/D7GvwSY9op

    @Komodosec

    24 Jul 2025

    24 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  4. Want to stay protected? Use $SIGIL's AI MCP A recent critical vulnerability (CVE-2025-49596) in Anthropic’s MCP Inspector exposed AI developers to remote code execution risks, allowing attackers to run arbitrary commands on developer machines through unauthenticated MCP serve

    @Sigil_AI

    10 Jul 2025

    4592 Impressions

    30 Retweets

    107 Likes

    0 Bookmarks

    20 Replies

    0 Quotes

  5. Falha RCE em Anthropic MCP Inspector (CVE-2025-49596) permitia execução remota explorando type confusion no proxy server. Explorar consistia em enviar payloads MCP maliciosos que eram interpretados sem sanitização, abrindo shell no host de desenvolvimento.

    @hashtagsec

    10 Jul 2025

    35 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  6. 🚨 CVE-2025-49596 (CVSS 9.4): Anthropic MCP Inspector <0.14.1 vulnerable to unauth RCE via CSRF/DNS-rebind. A malicious website hitting localhost = shell. Update to 0.14.1+ & add auth now. More: https://t.co/2cXf3o89OV #CVE202549596 #AppSec #CloudSecurity

    @empherehq

    9 Jul 2025

    4 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  7. 🚨 Critical Security Alert: A vulnerability in Anthropic’s MCP Inspector (CVE-2025-49596) allows remote code execution, posing risks to developers and businesses. While patched, this highlights the need for robust security in AI tools, especially for accessibility application

    @triepod_ai

    8 Jul 2025

    43 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  8. 🚨 Critical Security Alert: A vulnerability in Anthropic’s MCP Inspector (CVE-2025-49596) allows remote code execution, posing risks to developers and businesses. While patched, this highlights the need for robust security in AI tools, especially for accessibility application

    @triepod_ai

    8 Jul 2025

    5 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  9. 🚨 Critical Security Alert: A vulnerability in Anthropic’s MCP Inspector (CVE-2025-49596) allows remote code execution, posing risks to developers and businesses. While patched, this highlights the need for robust security in AI tools, especially for accessibility application

    @triepod_ai

    8 Jul 2025

    6 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  10. 🚨 Critical Security Alert: A vulnerability in Anthropic’s MCP Inspector (CVE-2025-49596) allows remote code execution, posing risks to developers and businesses. While patched, this highlights the need for robust security in AI tools, especially for accessibility application

    @triepod_ai

    8 Jul 2025

    7 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  11. Security Alert: Critical Vulnerabilities in Anthropic's MCP Developments 🚨 Critical Vulnerability in MCP Inspector (CVE-2025-49596)A Remote Code Execution (RCE) flaw was found in versions below 0.14.1. Attackers could execute code on developer machines, risking assistive https

    @triepod_ai

    7 Jul 2025

    37 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  12. Critical RCE Vulnerability in Anthropic MCP Inspector - CVE-2025-49596 https://t.co/7tjIVgfuyA

    @Dinosn

    6 Jul 2025

    3430 Impressions

    8 Retweets

    27 Likes

    16 Bookmarks

    1 Reply

    2 Quotes

  13. Security researchers have identified a critical vulnerability (CVE-2025-49596, CVSS 9.4) in Anthropic’s MCP Inspector that could enable remote code execution and complete host takeover.

    @S84788Aicores

    6 Jul 2025

    41 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  14. CVE-2025-49596: The MCP inspector is a developer tool for testing MCP servers. Versions below 0.14.1 are vulnerable to remote code execution due to lack of authentication between the Inspector client and proxy, allowing unauthenticated requests to launch MCP commands over stdio

    @ZeroDayFacts

    5 Jul 2025

    4 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  15. Critical RCE Vulnerability in Anthropic MCP Inspector - CVE-2025-49596 https://t.co/XeuIrTffSL #machinelearning #ai

    @eyalestrin

    3 Jul 2025

    19 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  16. CVE-2025-49596: vulnerabilità RCE in Anthropic MCP Inspector espone a exploit via browser Vulnerabilità, AI, Anthropic, browser, evidenza, exploit, MCP Inspector, rce https://t.co/2ASfE3Y02x https://t.co/c53fjJjYQD

    @matricedigitale

    2 Jul 2025

    19 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  17. Critical vulnerability in Anthropic's MCP Inspector (CVE-2025-49596) - attackers can run remote code and take full control of dev machines. The issue is insecure default settings. Attackers trick devs into visiting malicious sites through browser flaws/CSRF, then execute https:/

    @Hankyone

    2 Jul 2025

    65 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  18. CVE-2025-49596 : Critical RCE in Anthropic MCP Inspector Enables Browser-Based Exploits https://t.co/6iuuGfmDck https://t.co/bKLv0oyXMq

    @freedomhack101

    2 Jul 2025

    41 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  19. 🗞️ A critical remote code execution (RCE) vulnerability (CVE-2025-49596) has been discovered in Anthropic's Model Context Protocol (MCP) Inspector, allowing attackers to gain complete control over developer machines. Key takeaways: 🧵 https://t.co/GoVTTKGXnn

    @gossy_84

    2 Jul 2025

    68 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  20. 01/07/2025 Critical vulnerability in Anthropic's MCP could lead to RCE, granting attackers full access to developer machines. CVE-2025-49596, CVSS 9.4/10. Immediate action recommended! 🚨 Source: https://t.co/p1rx2ff6Ms

    @kernyx64

    2 Jul 2025

    35 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  21. 🚨Alert🚨 CVE-2025-49596:Critical RCE Vulnerability in Anthropic MCP Inspector 🧐Deep Dive from @avi_lum : https://t.co/R9LGzBIqVy 📊137 Services are found on the https://t.co/ysWb28Crld yearly. 🔗Hunter Link:https://t.co/fpNmOaZFdB 👇Query HUNTER : https://t.co/q9rtu

    @HunterMapping

    2 Jul 2025

    2901 Impressions

    12 Retweets

    36 Likes

    9 Bookmarks

    2 Replies

    0 Quotes

  22. Critical RCE in Anthropic MCP Inspector (CVE-2025-49596) Enables Browser-Based Exploits | Oligo Security https://t.co/oXJrhKiBZs https://t.co/d8IVEwpRPQ

    @secharvesterx

    1 Jul 2025

    37 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  23. CVE-2025-49596: Critical RCE in Anthropic MCP Inspector I stumbled across a nasty 0day in Anthropic’s official MCP Inspector. Turns out: any public website could have exploited it to run arbitrary bash commands. https://t.co/VuXeUJWvOD

    @avi_lum

    30 Jun 2025

    4399 Impressions

    6 Retweets

    47 Likes

    28 Bookmarks

    4 Replies

    0 Quotes

  24. 🟥 CVE-2025-49596, CVSS: 9.4 (#Critical) #MCP Inspector version < 0.14.1 #Vulnerability allows remote code execution due to lack of authentication between the Inspector client and proxy. #CyberSecurity #CVE #RemoteCodeExecution #MCPInspector https://t.co/k7ZDYm3drw htt

    @UjlakiMarci

    14 Jun 2025

    1159 Impressions

    8 Retweets

    17 Likes

    7 Bookmarks

    1 Reply

    0 Quotes

  25. 🚨 CRITICAL: CVE-2025-49596 in MCP Inspector (<0.14.1) lets unauth attackers execute remote code! Patch ASAP. No exploits yet. https://t.co/DOaoaqWZ86 #OffSeq #CVE2025 #infosec https://t.co/GqZr0cmubK

    @offseq

    14 Jun 2025

    37 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  26. [CVE-2025-49596: CRITICAL] MCP Inspector versions below 0.14.1 are vulnerable to remote code execution due to lack of authentication. Upgrade to version 0.14.1 or later to secure your servers. #cybersecurity#cve,CVE-2025-49596,#cybersecurity https://t.co/iyrX0AhRxx https://t.co/C

    @CveFindCom

    13 Jun 2025

    41 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  27. CVE-2025-49596 The MCP inspector is a developer tool for testing and debugging MCP servers. Versions of MCP Inspector below 0.14.1 are vulnerable to remote code execution due to lac… https://t.co/ar0nqaAEBt

    @CVEnew

    13 Jun 2025

    778 Impressions

    1 Retweet

    2 Likes

    0 Bookmarks

    0 Replies

    0 Quotes