-
Notifications
You must be signed in to change notification settings - Fork 209
Open
Labels
Contributor mainThe main issue a contributor is working on (top of the contribution queue).The main issue a contributor is working on (top of the contribution queue).PRP:Accepted
Description
- Identifier of the vulnerability: CVE-2025-49596
- Affected software: MCP Inspector
- Type of vulnerability: Authentication Bypass
- Requires authentication: No
- Language you would use for writing the plugin: Templated Plugin
- Resources:
GHSA-7f8r-222p-6f5g
https://github.com/ashiqrehan-21/MCP-Inspector-CVE-2025-49596/tree/main
https://github.com/modelcontextprotocol/inspector/
In the above checker repository, it only checks for the authorization header in the response. I've verified that this is a valid and reliable indicator on multiple versions. However, I couldn't find any source that explains the real code execution. I'm planning to implement a template plugin that checks the vulnerability in the same way, if you are okay with that. However, I could research further about this to perform exact code execution.
Metadata
Metadata
Assignees
Labels
Contributor mainThe main issue a contributor is working on (top of the contribution queue).The main issue a contributor is working on (top of the contribution queue).PRP:Accepted