An XSS flaw exists in the MCP Inspector local development tool when it renders a redirect URL returned by a remote MCP server. If the Inspector connects to an untrusted server, a crafted redirect can inject script into the Inspector context and, via the built-in proxy, be leveraged to trigger arbitrary command execution on the developer machine. Version 0.16.6 hardens URL handling/validation and prevents script execution.
Thank you to the following researchers for their reports and contributions: * Raymond (Veria Labs) * Gavin Zhong, superboyzjc@gmail.com & Shuyang Wang, swang@obsidiansecurity.com.
{
"github_reviewed": true,
"github_reviewed_at": "2025-09-08T21:14:23Z",
"severity": "HIGH",
"nvd_published_at": "2025-09-08T22:15:34Z",
"cwe_ids": [
"CWE-79",
"CWE-84",
"CWE-94"
]
}