A critical Remote Code Execution (RCE) vulnerability in Anthropic’s MCP Inspector tool, designated as CVE-2025-49596, exposes AI developers and organizations to significant cyber threats through browser-based attacks. This vulnerability allows attackers to execute arbitrary code on developers’ machines, potentially leading to data theft and system compromise. The flaw affects all versions of MCP Inspector prior to 0.14.1. Major technology companies relying on MCP-related technologies for AI and cloud services could be affected.
Source: https://cybersecuritynews.com/anthropic-mcp-inspector-vulnerability/
TPRM report: https://scoringcyber.rankiteo.com/company/anthropic
"id": "ant618070225",
"linkid": "anthropic",
"type": "Vulnerability",
"date": "7/2025",
"severity": "85",
"impact": "4",
"explanation": "Attack with significant impact with customers data leaks"
{'affected_entities': [{'industry': 'AI and cloud services',
'name': 'Anthropic',
'type': 'Technology company'}],
'attack_vector': ['Malicious websites', 'CSRF attacks', '0.0.0.0-day exploit'],
'data_breach': {'sensitivity_of_data': 'High'},
'date_detected': '2025-03-01',
'description': 'A critical Remote Code Execution (RCE) vulnerability in '
'Anthropic’s MCP Inspector tool, designated as CVE-2025-49596, '
'has a severe CVSS score of 9.4. This vulnerability represents '
'one of the first critical security flaws found in Anthropic’s '
'Model Context Protocol (MCP) ecosystem, potentially exposing '
'AI developers and organizations to significant cyber threats '
'through browser-based attacks.',
'impact': {'data_compromised': 'Sensitive data',
'systems_affected': "Developers' machines"},
'initial_access_broker': {'entry_point': 'Malicious websites'},
'lessons_learned': ['Importance of session token authentication',
'Need for origin verification',
'Rapid patching of critical vulnerabilities'],
'motivation': ['Data theft', 'System compromise'],
'post_incident_analysis': {'corrective_actions': ['Implement session token '
'authentication',
'Improve security '
'documentation',
'Enhance origins '
'verification'],
'root_causes': ['Lack of proper authentication '
'mechanisms',
'CSRF vulnerabilities',
'0.0.0.0-day browser '
'vulnerability']},
'recommendations': ['Upgrade to version 0.14.1 or later',
'Verify current version using npm list -g',
'Check for project-specific instances in node_modules '
'directories'],
'response': {'remediation_measures': ['Upgrade to version 0.14.1+',
'Session token authentication',
'Authorization mechanisms',
'Origin verification']},
'title': 'Critical Remote Code Execution (RCE) Vulnerability in Anthropic’s '
'MCP Inspector Tool',
'type': 'Remote Code Execution (RCE)',
'vulnerability_exploited': 'CVE-2025-49596'}