Critical Figma MCP Vulnerability Allows Remote Code Execution Exploit

Command Injection Vulnerability in figma-developer-mcp MCP Server Allows Remote Code Execution, Fixed in Version 0.6.3

  • A command injection vulnerability was found in the figma-developer-mcp Model Context Protocol (MCP) server.
  • The flaw could allow attackers to run arbitrary system commands and achieve remote code execution.
  • The issue stems from unvalidated user input used in shell commands executed via child_process.exec.
  • The vulnerability was fixed in version 0.6.3 of figma-developer-mcp, released on September 29, 2025.
  • Security experts highlight the risk this flaw poses to AI-powered development tools integrated with Figma and similar platforms.

Cybersecurity researchers disclosed a vulnerability in the figma-developer-mcp Model Context Protocol (MCP) server that could enable attackers to execute arbitrary system commands remotely. The issue was publicly reported on October 8, 2025, and affects the widely used MCP server connected to Figma, an online design platform.

- Advertisement -

The vulnerability, identified as CVE-2025-53967 with a CVSS score of 7.5, results from unsafe handling of user input when constructing shell commands. The server uses unvalidated input directly in command-line strings, allowing shell metacharacter injection such as |, >, &&, enabling attackers to inject and execute malicious commands. This flaw was addressed by Imperva, the cybersecurity company that discovered and reported it in July 2025.

According to the GitHub advisory, exploitation occurs when the MCP client sends requests that invoke tools like get_figma_data or download_figma_images via JSONRPC calls. The root cause lies in the file “src/utils/fetch-with-retry.ts,” which tries to fetch data using the standard API and, if it fails, runs a curl command through child_process.exec. Because inputs are directly embedded in the shell command without validation, attackers can craft inputs that inject arbitrary shell code.

“Because the curl command is constructed by directly interpolating URL and header values into a shell command string, a malicious actor could craft a specially designed URL or header value that injects arbitrary shell commands,” Imperva explained. This leads to remote code execution on the host machine with the server’s privileges.

Attackers on the same network or those who trick users into visiting malicious websites via DNS rebinding attacks can trigger the exploit. The vulnerability was patched in version 0.6.3 of figma-developer-mcp, released on September 29, 2025. The fix includes avoiding the use of child_process.exec with untrusted data and switching to safer methods like child_process.execFile that do not allow shell interpretation.

- Advertisement -

Experts warn that as AI-driven development tools, such as Cursor, increasingly integrate with platforms like Figma, security risks become more critical. The flaw underlines potential dangers when local tools serve as entry points for attackers.

In related news, security researchers at FireTail disclosed that Google’s Gemini AI chatbot has an unresolved ASCII smuggling technique vulnerability. This attack method can bypass security filters and induce harmful behavior, representing a broader challenge for AI systems embedded deeply into enterprise platforms.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Bitcoin Crashes to 15-Month Low Amid Extreme Fear

Create a cryptocurrency news article based on the In brief Bitcoin slid to a 15-month...

Claude AI Finds 500+ New High-Severity Open-Source Bugs

Anthropic's new AI model, Claude Opus 4.6, autonomously discovered over 500 previously unknown high-severity...

Ripple’s XRP Plunges 20%, Nears $1 in Cryptocurrency Rout

Ripple's XRP price plummeted more than 20% in the day’s trading session early Friday,...

Bitcoin ETF Boomers Hold Strong Amid 40% Price Plunge

Bitcoin has fallen over 40% from recent highs, yet only 6.6% of assets have...

Musk Denies Starlink Phone, Confirms Other Plans

Elon Musk denied SpaceX is developing a phone, contradicting recent rumors.The Starlink division generated...
- Advertisement -

Must Read

How Cryptocurrency Works For Beginners?

Welcome to the world of cryptocurrency! If you're new to this exciting and rapidly evolving landscape, you might feel like Alice in Wonderland, exploring...
🔥 #AD Get 20% OFF any new 12 month hosting plan from Hostinger. Click here!