GHSA-7f8r-222p-6f5g

Suggest an improvement
Source
https://github.com/advisories/GHSA-7f8r-222p-6f5g
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/06/GHSA-7f8r-222p-6f5g/GHSA-7f8r-222p-6f5g.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-7f8r-222p-6f5g
Aliases
Published
2025-06-13T22:15:26Z
Modified
2025-07-09T20:18:37Z
Severity
  • 9.4 (Critical) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H CVSS Calculator
Summary
MCP Inspector proxy server lacks authentication between the Inspector client and proxy
Details

Versions of MCP Inspector below 0.14.1 are vulnerable to remote code execution due to lack of authentication between the Inspector client and proxy, allowing unauthenticated requests to launch MCP commands over stdio. Users should immediately upgrade to version 0.14.1 or later to address these vulnerabilities.

Credit: Rémy Marot bughunters@tenable.com

Database specific
{
    "github_reviewed": true,
    "cwe_ids": [
        "CWE-306"
    ],
    "nvd_published_at": "2025-06-13T20:15:23Z",
    "severity": "CRITICAL",
    "github_reviewed_at": "2025-06-13T22:15:26Z"
}
References

Affected packages

npm / @modelcontextprotocol/inspector

Package

Name
@modelcontextprotocol/inspector
View open source insights on deps.dev
Purl
pkg:npm/%40modelcontextprotocol/inspector

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.14.1