A command-injection vulnerability lets any attacker who can influence the server_name field of an MCP execute arbitrary OS commands on Windows hosts that run fastmcp install cursor
server.py
import random
from fastmcp import FastMCP
mcp = FastMCP(name="test&calc")
@mcp.tool
def roll_dice(n_dice: int) -> list[int]:
"""Roll `n_dice` 6-sided dice and return the results."""
return [random.randint(1, 6) for _ in range(n_dice)]
if __name__ == "__main__":
mcp.run()
then run in the terminal:
fastmcp install cursor server.py
OS Command / Shell Injection (CWE-78) Every Windows host that runs fastmcp install cursor is at risk. Developers on their local workstations, CI/CD agents and corporate build machines alike.
{
"github_reviewed_at": "2025-10-29T15:39:03Z",
"github_reviewed": true,
"cwe_ids": [
"CWE-78"
],
"nvd_published_at": "2025-10-28T22:15:37Z",
"severity": "MODERATE"
}