We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-49596

MCP Inspector proxy server lacks authentication between the Inspector client and proxy



Description

The MCP inspector is a developer tool for testing and debugging MCP servers. Versions of MCP Inspector below 0.14.1 are vulnerable to remote code execution due to lack of authentication between the Inspector client and proxy, allowing unauthenticated requests to launch MCP commands over stdio. Users should immediately upgrade to version 0.14.1 or later to address these vulnerabilities.

Reserved 2025-06-06 | Published 2025-06-13 | Updated 2025-06-13 | Assigner GitHub_M


CRITICAL: 9.4CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H

Problem types

CWE-306: Missing Authentication for Critical Function

Product status

< 0.14.1
affected

References

github.com/...pector/security/advisories/GHSA-7f8r-222p-6f5g

github.com/...ommit/50df0e1ec488f3983740b4d28d2a968f12eb8979

cve.org (CVE-2025-49596)

nvd.nist.gov (CVE-2025-49596)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-49596

Support options

Helpdesk Chat, Email, Knowledgebase