MCP Client Configuration File Detected

medium Web App Scanning Plugin ID 114803

Synopsis

MCP Client Configuration File Detected

Description

MCP (Model Context Protocol) configuration files allow specific softwares such as IDEs like Cursor to interact with MCP servers. These files may contain sensitive information which could assist an attack to conduct further attacks.

Solution

Restrict access to this client configuration file or delete it if not required by the target web application. Ensure that all potential secrets available in the file are rotated.

See Also

https://code.visualstudio.com/docs/copilot/chat/mcp-servers

https://docs.cursor.com/context/model-context-protocol

https://docs.windsurf.com/windsurf/cascade/mcp

Plugin Details

Severity: Medium

ID: 114803

Type: remote

Published: 5/23/2025

Updated: 5/23/2025

Scan Template: api, basic, full, pci, scan

Risk Information

VPR

Risk Factor: Low

Score: 1.4

CVSS v2

Risk Factor: Medium

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS Score Source: Tenable

CVSS v3

Risk Factor: Medium

Base Score: 5.3

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

CVSS Score Source: Tenable

CVSS v4

Risk Factor: Medium

Base Score: 6.9

Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

CVSS Score Source: Tenable

Vulnerability Information

Exploit Ease: Exploits are available

Reference Information