BTC $71,807
2026 Bull Run Is Building Start trading with 5% OFF all fees
Sign Up Now
BTC $71,807
Bull Run 2026 | 5% Off Fees Open your Binance account today
Sign Up

Critical RCE Flaw Found in Anthropic MCP Inspector, CVE-2025-49596

Researchers found a major security flaw in Anthropic's Model Context Protocol (MCP) Inspector tool that could enable remote code execution.

  • The vulnerability, tracked as CVE-2025-49596, has a critical CVSS score of 9.4 out of 10.
  • Attackers could exploit the flaw by chaining browser and protocol weaknesses to execute commands on a victim’s device.
  • Anthropic released a fix in version 0.14.1 of MCP Inspector, which now requires authentication and checks request origins.
  • The flaw highlighted risks for developers and organizations using MCP tools without secure configurations.

Cybersecurity researchers have identified a major vulnerability in Anthropic‘s Model Context Protocol (MCP) Inspector developer tool, which could allow attackers to take control of affected computers through remote code execution. The issue, disclosed in June 2025, impacts tools used to integrate Artificial Intelligence applications with outside data sources.

- Advertisement -

The flaw, designated as CVE-2025-49596, received a rating of 9.4 out of 10 for severity. According to Oligo Security’s Avi Lumelsky, “With code execution on a developer’s machine, attackers can steal data, install backdoors, and move laterally across networks – highlighting serious risks for AI teams, open-source projects, and enterprise adopters relying on MCP.”

Anthropic launched MCP in November 2024 as an open standard for large language model (LLM) applications to access and exchange data with external resources. The MCP Inspector tool, affected by the vulnerability, helps developers test and debug these connections using a client interface and a proxy server.

The primary security risk occurred because earlier versions of MCP Inspector did not require authentication or use encryption for local connections. This left systems open to attack if the MCP server was accessible to public or local networks. Attackers could combine a known browser flaw, called “0.0.0.0 Day,” with a cross-site request forgery (CSRF) vulnerability to execute malicious commands as soon as a developer visited a harmful website.

Researchers demonstrated that the proxy server’s default settings could listen on all IP addresses—including internal addresses—making them reachable from malicious web pages. The attack could also utilize DNS rebinding, tricking the browser into recognizing an attacker’s address as trusted.

- Advertisement -

Following notification of the issue in April, Anthropic released version 0.14.1 of the MCP Inspector on June 13. The update adds mandatory session tokens for the proxy server and checks the source of incoming requests, blocking CSRF and DNS rebinding attack methods. According to project maintainers, “The mitigation adds Authorization which was missing in the default prior to the fix, as well as verifying the Host and Origin headers in HTTP, making sure the client is really visiting from a known, trusted domain.”

Developers and organizations using older versions of MCP Inspector are advised to update immediately and review their network configurations to avoid exposing the MCP server to untrusted networks.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -
Ad
Altseason Is Loading. Don't watch from the sidelines.
SOL $90.51
DOGE $0.0963
LINK $9.02
SUI $1.00
5% off fees when you sign up
Start Trading
Ad
Pay Less on Every Trade. For Life.
$10K/mo volume Save $60/yr
$50K/mo volume Save $300/yr
$100K/mo volume Save $600/yr
5% off all trading fees when you sign up
Claim Your Discount

Latest News

Trump-Backed Crypto Token WLFI Plummets to Record Low

The World Liberty Financial token WLFI plunged to an all-time low, dropping 83% from...

Global Police Use Ad-Based Phone Tracking

An ad-based surveillance tool, Webloc, is used by global law enforcement to track up...

Suspect Arrested After Molotov Cocktail Attack on OpenAI CEO’s Home

A suspect allegedly threw a Molotov cocktail at the home of OpenAI CEO Sam...

Suspect Attacks OpenAI CEO Sam Altman’s Home With Molotov Cocktail

OpenAI CEO Sam Altman's San Francisco home was targeted with a Molotov cocktail early...

Justin Sun’s $70M Frozen in Trump-Linked Crypto Project

Justin Sun had approximately 544 million World Liberty Financial tokens frozen in September 2024...

Must Read

The 13 Best Crypto Advertising Networks to Grow Your Project

TABLE OF CONTENTSWhy Traditional Ad Networks (Like Google & Facebook) Fail CryptoQuick-View Comparison TableHow to Choose the Right Crypto Ad Network for Your ProjectBest...
Ad
Altseason Is Loading. These 4 coins are trending right now.
SOL $92.12
DOGE $0.0950
LINK $9.02
SUI $1.02
5% off spot fees when you sign up
Start Trading