MCP Inspector < 0.14.1 Remote Code Execution

critical Web App Scanning Plugin ID 114906

Synopsis

MCP Inspector < 0.14.1 Remote Code Execution

Description

According to the self-reported version number, the version of MCP Inspector hosted on the remote is affected by a Remote Code Execution vulnerability.

Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.

This detection is included in the AI and LLM category.

Solution

Upgrade to version 0.14.1 or later.

See Also

https://github.com/modelcontextprotocol/inspector

https://github.com/modelcontextprotocol/inspector/security/advisories/GHSA-7f8r-222p-6f5g

https://www.tenable.com/security/research/tra-2025-20

Plugin Details

Severity: Critical

ID: 114906

Type: remote

Published: 7/4/2025

Updated: 7/4/2025

Scan Template: basic, full, pci, scan

Risk Information

VPR

Risk Factor: Critical

Score: 9.0

CVSS v2

Risk Factor: High

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2025-49596

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS Score Source: CVE-2025-49596

CVSS v4

Risk Factor: Critical

Base Score: 9.4

Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H

CVSS Score Source: CVE-2025-49596

Vulnerability Information

CPE: cpe:2.3:a:modelcontextprotocol:inspector:*:*:*:*:*:*:*:*

Exploit Ease: Exploits are available

Vulnerability Publication Date: 6/12/2025

Reference Information

CVE: CVE-2025-49596