GHSA-g9hg-qhmf-q45m

Suggest an improvement
Source
https://github.com/advisories/GHSA-g9hg-qhmf-q45m
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/09/GHSA-g9hg-qhmf-q45m/GHSA-g9hg-qhmf-q45m.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-g9hg-qhmf-q45m
Aliases
Published
2025-09-08T21:14:23Z
Modified
2025-09-26T17:07:01Z
Severity
  • 8.6 (High) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N CVSS Calculator
Summary
MCP Inspector is Vulnerable to Potential Command Execution via XSS When Connecting to an Untrusted MCP Server
Details

An XSS flaw exists in the MCP Inspector local development tool when it renders a redirect URL returned by a remote MCP server. If the Inspector connects to an untrusted server, a crafted redirect can inject script into the Inspector context and, via the built-in proxy, be leveraged to trigger arbitrary command execution on the developer machine. Version 0.16.6 hardens URL handling/validation and prevents script execution.

Thank you to the following researchers for their reports and contributions: * Raymond (Veria Labs) * Gavin Zhong, superboyzjc@gmail.com & Shuyang Wang, swang@obsidiansecurity.com.

Database specific
{
    "github_reviewed": true,
    "github_reviewed_at": "2025-09-08T21:14:23Z",
    "severity": "HIGH",
    "nvd_published_at": "2025-09-08T22:15:34Z",
    "cwe_ids": [
        "CWE-79",
        "CWE-84",
        "CWE-94"
    ]
}
References

Affected packages

npm / @modelcontextprotocol/inspector

Package

Name
@modelcontextprotocol/inspector
View open source insights on deps.dev
Purl
pkg:npm/%40modelcontextprotocol/inspector

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.16.6

Database specific

source
"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/09/GHSA-g9hg-qhmf-q45m/GHSA-g9hg-qhmf-q45m.json"