# MCP Inspector代理认证缺失漏洞
## 漏洞概述
MCP Inspector 是一个用于测试和调试 MCP 服务器的开发工具。版本低于 0.14.1 的 MCP Inspector 存在远程代码执行漏洞,原因在于 Inspector 客户端和代理之间缺乏认证,允许未认证的请求通过 stdio 发起 MCP 命令。
## 影响版本
- 0.14.1 以下的所有版本
## 漏洞细节
由于 Inspector 客户端和代理之间的通信缺乏认证机制,攻击者可以发起未认证的请求,通过 stdio 接口执行 MCP 命令,从而实现远程代码执行。
## 影响
该漏洞使攻击者能够在未授权的情况下执行恶意命令,导致潜在的安全风险。建议用户立即升级到版本 0.14.1 或更高版本以解决该漏洞。
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | MCP-Inspector-vulncheck is a Python script that checks if an MCP Inspector server is vulnerable to CVE-2025-49596. It tests whether the /sse endpoint responds to unauthenticated requests, indicating a potential security flaw. The script is simple to use and provides clear output on whether the target server is likely vulnerable or patched. | https://github.com/ashiqrehan-21/MCP-Inspector-CVE-2025-49596 | POC详情 |
| 2 | The MCP inspector is a developer tool for testing and debugging MCP servers. Versions of MCP Inspector below 0.14.1 are vulnerable to remote code execution due to lack of authentication between the Inspector client and proxy, allowing unauthenticated requests to launch MCP commands over stdio. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-49596.yaml | POC详情 |
标题: MCP Vulnerability Exposes the AI Untrusted Code Crisis - The New Stack -- 🔗来源链接
标签: x_refsource_MISC
神龙速读标题: Inspector proxy server vulnerabilities · Advisory · modelcontextprotocol/inspector · GitHub -- 🔗来源链接
标签: x_refsource_CONFIRM
神龙速读标题: Merge commit from fork · modelcontextprotocol/inspector@50df0e1 · GitHub -- 🔗来源链接
标签: x_refsource_MISC
神龙速读标题: Critical RCE in Anthropic MCP Inspector (CVE-2025-49596) Enables Browser-Based Exploits | Oligo Security -- 🔗来源链接
标签: x_refsource_MISC
神龙速读暂无评论