Remote Code Execution Vulnerability in MCPJam Inspector by MCP
CVE-2026-23744
Key Information:
Badges
What is CVE-2026-23744?
CVE-2026-23744 is a severe remote code execution vulnerability found in MCPJam Inspector, a local-first development platform specifically designed for MCP servers. This vulnerability affects versions 1.4.2 and earlier, enabling an attacker to craft a specially-designed HTTP request that can trigger the installation of an MCP server. Once this occurs, the attacker gains the ability to execute arbitrary code remotely on the affected system. The severity of this vulnerability is amplified by the fact that, by default, MCPJam Inspector listens on all network interfaces (0.0.0.0), making it susceptible to external attacks. Organizations that rely on MCPJam Inspector for their development processes risk severe disruptions and loss of control over their systems if they fail to address this vulnerability promptly. A patch has been made available in version 1.4.3, which addresses the issues caused by the vulnerability.
Potential impact of CVE-2026-23744
-
Remote Code Execution: This vulnerability allows attackers to execute arbitrary code on the server remotely, potentially leading to full system compromise. Such access can enable them to manipulate data, disrupt services, or install additional malware.
-
Data Breaches: Given the nature of the vulnerability, attackers could exploit it to gain unauthorized access to sensitive information stored within the MCP server environment, resulting in potential data leaks or breaches.
-
Widespread Exploitation Risk: The default configuration of MCPJam Inspector exposes it to the internet, significantly increasing the risk of widespread exploitation. This vulnerability's presence enhances the threat landscape, particularly in environments that are not promptly patched or monitored for vulnerabilities.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
inspector <= 1.4.2
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
EPSS Score
11% chance of being exploited in the next 30 days.
CVSS V3.1
Timeline
- π‘
Public PoC available
- πΎ
Exploit known to exist
Vulnerability published
Vulnerability Reserved
