Command Injection Vulnerability in iOS Simulator MCP Server by Joshua Oyes
CVE-2025-52573

6MEDIUM

Key Information:

Vendor

Joshuayoes

Vendor
CVE Published:
26 June 2025

What is CVE-2025-52573?

The iOS Simulator MCP Server, which is responsible for managing interactions with iOS simulators, is susceptible to command injection due to flaws in its implementation. Versions prior to 1.3.3 leverage an unsafe Node.js API, allowing malicious input to manipulate command execution through the exposed ui_tap tool. Users can exploit this vulnerability by injecting shell meta-characters in parameters such as duration and udid, inadvertently triggering a command execution that bypasses the intended functionality, potentially leading to system compromise. A patch was introduced in version 1.3.3 to address this insecurity.

Affected Version(s)

ios-simulator-mcp < 1.3.3

References

CVSS V3.1

Score:
6
Severity:
MEDIUM
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Local
Attack Complexity:
High
Privileges Required:
Low
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2025-52573 : Command Injection Vulnerability in iOS Simulator MCP Server by Joshua Oyes