Remote Code Execution Vulnerability in MCP Inspector by Model Context Protocol
CVE-2025-49596

9.4CRITICAL

Key Information:

Status
Vendor
CVE Published:
13 June 2025

What is CVE-2025-49596?

The MCP Inspector, a tool designed for testing and debugging MCP servers, is susceptible to remote code execution in versions prior to 0.14.1. The vulnerability arises from an absence of authentication between the Inspector client and the proxy, which allows unauthorized users to send commands to the MCP servers. This flaw enables malicious actors to exploit the system through unauthenticated requests. It is imperative for users to upgrade to version 0.14.1 or later to secure their environments against potential threats.

Affected Version(s)

inspector < 0.14.1

References

CVSS V4

Score:
9.4
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
Unknown

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2025-49596 : Remote Code Execution Vulnerability in MCP Inspector by Model Context Protocol