Home

Description

MCP Watch is a comprehensive security scanner for Model Context Protocol (MCP) servers. In 0.1.2 and earlier, the MCPScanner class contains a critical Command Injection vulnerability in the cloneRepo method. The application passes the user-supplied githubUrl argument directly to a system shell via execSync without sanitization. This allows an attacker to execute arbitrary commands on the host machine by appending shell metacharacters to the URL.

PUBLISHED Reserved 2025-11-28 | Published 2025-12-01 | Updated 2025-12-02 | Assigner GitHub_M




CRITICAL: 9.8CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

Product status

<= 0.1.2
affected

References

github.com/...-watch/security/advisories/GHSA-27m7-ffhq-jqrm

github.com/...ommit/e7da78c5b4b960f8b66c254059ad9ebc544a91a6

cve.org (CVE-2025-66401)

nvd.nist.gov (CVE-2025-66401)

Download JSON