Critical RCE Flaw Found in Anthropic MCP Inspector, CVE-2025-49596

Researchers found a major security flaw in Anthropic's Model Context Protocol (MCP) Inspector tool that could enable remote code execution.

  • The vulnerability, tracked as CVE-2025-49596, has a critical CVSS score of 9.4 out of 10.
  • Attackers could exploit the flaw by chaining browser and protocol weaknesses to execute commands on a victim’s device.
  • Anthropic released a fix in version 0.14.1 of MCP Inspector, which now requires authentication and checks request origins.
  • The flaw highlighted risks for developers and organizations using MCP tools without secure configurations.

Cybersecurity researchers have identified a major vulnerability in Anthropic‘s Model Context Protocol (MCP) Inspector developer tool, which could allow attackers to take control of affected computers through remote code execution. The issue, disclosed in June 2025, impacts tools used to integrate Artificial Intelligence applications with outside data sources.

- Advertisement -

The flaw, designated as CVE-2025-49596, received a rating of 9.4 out of 10 for severity. According to Oligo Security’s Avi Lumelsky, “With code execution on a developer’s machine, attackers can steal data, install backdoors, and move laterally across networks – highlighting serious risks for AI teams, open-source projects, and enterprise adopters relying on MCP.”

Anthropic launched MCP in November 2024 as an open standard for large language model (LLM) applications to access and exchange data with external resources. The MCP Inspector tool, affected by the vulnerability, helps developers test and debug these connections using a client interface and a proxy server.

The primary security risk occurred because earlier versions of MCP Inspector did not require authentication or use encryption for local connections. This left systems open to attack if the MCP server was accessible to public or local networks. Attackers could combine a known browser flaw, called “0.0.0.0 Day,” with a cross-site request forgery (CSRF) vulnerability to execute malicious commands as soon as a developer visited a harmful website.

Researchers demonstrated that the proxy server’s default settings could listen on all IP addresses—including internal addresses—making them reachable from malicious web pages. The attack could also utilize DNS rebinding, tricking the browser into recognizing an attacker’s address as trusted.

- Advertisement -

Following notification of the issue in April, Anthropic released version 0.14.1 of the MCP Inspector on June 13. The update adds mandatory session tokens for the proxy server and checks the source of incoming requests, blocking CSRF and DNS rebinding attack methods. According to project maintainers, “The mitigation adds Authorization which was missing in the default prior to the fix, as well as verifying the Host and Origin headers in HTTP, making sure the client is really visiting from a known, trusted domain.”

Developers and organizations using older versions of MCP Inspector are advised to update immediately and review their network configurations to avoid exposing the MCP server to untrusted networks.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Saylor’s “Sell a Kidney” Bitcoin Advice Costs Billions

Strategy, formerly MicroStrategy, has lost $20 billion in market value following a significant decline...

Chainlink Rebounds 3.8%, But $25 Target By March 2026 Unlikely

ChainLink (LINK) has shown minor gains of 3.8% in 24 hours, following Bitcoin's recent...

Saylor: Most Investors Prefer 10% Bank Over Bitcoin

MicroStrategy's Michael Saylor argues that most retail investors would prefer a stable 10% return...

Bitcoin Rallies Above $66,000 With Stocks, ETFs Inflow

Bitcoin surged above $66,000 on Wednesday, following a recovery in the US stock market.Bitcoin...

Former Defense Contractor Jailed for Selling Zero-Day Exploits

Former L3Harris manager Peter Williams sentenced to over seven years for stealing eight zero-day...

Must Read

How to Buy VPN With Bitcoin Using CyberGhost VPN

In this step-by-step guide, you will learn how to purchase a VPN (Virtual Private Network) subscription using Bitcoin, a popular cryptocurrency, and CyberGhost VPN,...
🔥 #AD Get 20% OFF any new 12 month hosting plan from Hostinger. Click here!