Loading cryptocurrency prices...

Critical Figma MCP Vulnerability Allows Remote Code Execution Exploit

Command Injection Vulnerability in figma-developer-mcp MCP Server Allows Remote Code Execution, Fixed in Version 0.6.3

  • A command injection vulnerability was found in the figma-developer-mcp Model Context Protocol (MCP) server.
  • The flaw could allow attackers to run arbitrary system commands and achieve remote code execution.
  • The issue stems from unvalidated user input used in shell commands executed via child_process.exec.
  • The vulnerability was fixed in version 0.6.3 of figma-developer-mcp, released on September 29, 2025.
  • Security experts highlight the risk this flaw poses to AI-powered development tools integrated with Figma and similar platforms.

Cybersecurity researchers disclosed a vulnerability in the figma-developer-mcp Model Context Protocol (MCP) server that could enable attackers to execute arbitrary system commands remotely. The issue was publicly reported on October 8, 2025, and affects the widely used MCP server connected to Figma, an online design platform.

- Advertisement -

The vulnerability, identified as CVE-2025-53967 with a CVSS score of 7.5, results from unsafe handling of user input when constructing shell commands. The server uses unvalidated input directly in command-line strings, allowing shell metacharacter injection such as |, >, &&, enabling attackers to inject and execute malicious commands. This flaw was addressed by Imperva, the cybersecurity company that discovered and reported it in July 2025.

According to the GitHub advisory, exploitation occurs when the MCP client sends requests that invoke tools like get_figma_data or download_figma_images via JSONRPC calls. The root cause lies in the file “src/utils/fetch-with-retry.ts,” which tries to fetch data using the standard API and, if it fails, runs a curl command through child_process.exec. Because inputs are directly embedded in the shell command without validation, attackers can craft inputs that inject arbitrary shell code.

“Because the curl command is constructed by directly interpolating URL and header values into a shell command string, a malicious actor could craft a specially designed URL or header value that injects arbitrary shell commands,” Imperva explained. This leads to remote code execution on the host machine with the server’s privileges.

Attackers on the same network or those who trick users into visiting malicious websites via DNS rebinding attacks can trigger the exploit. The vulnerability was patched in version 0.6.3 of figma-developer-mcp, released on September 29, 2025. The fix includes avoiding the use of child_process.exec with untrusted data and switching to safer methods like child_process.execFile that do not allow shell interpretation.

- Advertisement -

Experts warn that as AI-driven development tools, such as Cursor, increasingly integrate with platforms like Figma, security risks become more critical. The flaw underlines potential dangers when local tools serve as entry points for attackers.

In related news, security researchers at FireTail disclosed that Google’s Gemini AI chatbot has an unresolved ASCII smuggling technique vulnerability. This attack method can bypass security filters and induce harmful behavior, representing a broader challenge for AI systems embedded deeply into enterprise platforms.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Parag Agrawal’s AI Startup Raises $100M, Valued at $740 Million

Parallel Web Systems, founded by former Twitter CEO Parag Agrawal, has secured $100 million...

Crypto Fear Fuels Potential for Unexpected November Rally

Crypto market sentiment is showing extreme fear, the lowest since March, amid ongoing declines....

IBM Unveils 120-Qubit Nighthawk Chip, Aiming for Quantum Advantage by 2026

IBM unveiled the Nighthawk and Quantum Loon quantum processors, marking significant progress toward verified...

Nvidia Eyes $200 Return Amid AI Growth and Strategic Deals

NVIDIA stock has encountered resistance near $200 but rose 5% over the last month...

JPMorgan Expands JPM Coin to Base, Eyes Retail and Multi-Currency Use

JPMorgan has launched its dollar-backed stablecoin, JPM Coin (JPMD), for institutional transfers on the...
- Advertisement -

Must Read

What Are Anonymous Debit Cards And How Do They Work?

You've heard about anonymous debit cards, but what are they really? Anonymous Debit Cards are cards that let you make purchases without revealing your...