Critical Figma MCP Vulnerability Allows Remote Code Execution Exploit

Command Injection Vulnerability in figma-developer-mcp MCP Server Allows Remote Code Execution, Fixed in Version 0.6.3

  • A command injection vulnerability was found in the figma-developer-mcp Model Context Protocol (MCP) server.
  • The flaw could allow attackers to run arbitrary system commands and achieve remote code execution.
  • The issue stems from unvalidated user input used in shell commands executed via child_process.exec.
  • The vulnerability was fixed in version 0.6.3 of figma-developer-mcp, released on September 29, 2025.
  • Security experts highlight the risk this flaw poses to AI-powered development tools integrated with Figma and similar platforms.

Cybersecurity researchers disclosed a vulnerability in the figma-developer-mcp Model Context Protocol (MCP) server that could enable attackers to execute arbitrary system commands remotely. The issue was publicly reported on October 8, 2025, and affects the widely used MCP server connected to Figma, an online design platform.

- Advertisement -

The vulnerability, identified as CVE-2025-53967 with a CVSS score of 7.5, results from unsafe handling of user input when constructing shell commands. The server uses unvalidated input directly in command-line strings, allowing shell metacharacter injection such as |, >, &&, enabling attackers to inject and execute malicious commands. This flaw was addressed by Imperva, the cybersecurity company that discovered and reported it in July 2025.

According to the GitHub advisory, exploitation occurs when the MCP client sends requests that invoke tools like get_figma_data or download_figma_images via JSONRPC calls. The root cause lies in the file “src/utils/fetch-with-retry.ts,” which tries to fetch data using the standard API and, if it fails, runs a curl command through child_process.exec. Because inputs are directly embedded in the shell command without validation, attackers can craft inputs that inject arbitrary shell code.

“Because the curl command is constructed by directly interpolating URL and header values into a shell command string, a malicious actor could craft a specially designed URL or header value that injects arbitrary shell commands,” Imperva explained. This leads to remote code execution on the host machine with the server’s privileges.

Attackers on the same network or those who trick users into visiting malicious websites via DNS rebinding attacks can trigger the exploit. The vulnerability was patched in version 0.6.3 of figma-developer-mcp, released on September 29, 2025. The fix includes avoiding the use of child_process.exec with untrusted data and switching to safer methods like child_process.execFile that do not allow shell interpretation.

- Advertisement -

Experts warn that as AI-driven development tools, such as Cursor, increasingly integrate with platforms like Figma, security risks become more critical. The flaw underlines potential dangers when local tools serve as entry points for attackers.

In related news, security researchers at FireTail disclosed that Google’s Gemini AI chatbot has an unresolved ASCII smuggling technique vulnerability. This attack method can bypass security filters and induce harmful behavior, representing a broader challenge for AI systems embedded deeply into enterprise platforms.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Bitcoin Rebounds But Faces Key $74.5K Resistance Test

Bitcoin rebounded 7.45% after dropping to $62,400, testing a key onchain support level.The realized...

Aeternum Botnet Uses Blockchain C2 for Takedown Resistance

A new botnet loader called Aeternum C2 uses the public Polygon blockchain for its...

Apple Previews New Tech to Fuel Stock Surge

Apple CEO Tim Cook has teased a series of new product reveals set to...

MrBeast Editor Fined, Suspended For Insider Trading

Beast Industries suspended a video editor who was fined $20,000 and banned for two...

Paypal preps for activist defense amid bid rumors

Paypal is reportedly not engaged in any current sale talks with Stripe or other...

Must Read

Ethereum Hosting: TOP 10 Companies to Buy Hosting With Ethereum

If you are looking for Ethereum Hosting, you've hit the jackpot. In this article, we will present the 10 Best companies to buy hosting...
🔥 #AD Get 20% OFF any new 12 month hosting plan from Hostinger. Click here!