CVE-2025-49596

Published Jun 13, 2025

Last updated 11 hours ago

CVSS critical 9.4
MCP Inspector

Overview

AI description

Automated description summarized from trusted sources.

CVE-2025-49596 affects MCP Inspector versions below 0.14.1. The vulnerability stems from a lack of authentication between the Inspector client and proxy. This allows unauthenticated requests to launch MCP commands over stdio. Specifically, the absence of authentication allows an attacker to potentially execute arbitrary remote commands on the MCP server. The vulnerability can be exploited remotely and doesn't require authentication. To remediate this vulnerability, users should upgrade to MCP Inspector version 0.14.1 or later.

Description
The MCP inspector is a developer tool for testing and debugging MCP servers. Versions of MCP Inspector below 0.14.1 are vulnerable to remote code execution due to lack of authentication between the Inspector client and proxy, allowing unauthenticated requests to launch MCP commands over stdio. Users should immediately upgrade to version 0.14.1 or later to address these vulnerabilities.
Source
security-advisories@github.com
NVD status
Awaiting Analysis

Risk scores

CVSS 4.0

Type
Secondary
Base score
9.4
Impact score
-
Exploitability score
-
Vector string
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Severity
CRITICAL

Weaknesses

security-advisories@github.com
CWE-306

Social media

Hype score is a measure of social media activity compared against trending CVEs from the past 12 months. Max score 100.

Hype score

4