PT-2025-28894 · Unknown · Mcp-Remote
Or Peles
·
Published
2025-07-09
·
Updated
2025-07-17
·
CVE-2025-6514
9.6
Critical
Base vector | Vector | AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H |
**Name of the Vulnerable Software and Affected Versions:**
mcp-remote versions 0.0.5 through 0.1.15
**Description:**
mcp-remote is susceptible to OS command injection when connecting to untrusted MCP servers due to crafted input from the `authorization endpoint` response URL. This vulnerability allows for remote code execution, potentially leading to full system compromise. Over 437,000 downloads have been impacted. This marks the first documented case of remote code execution in MCP communications. The vulnerability allows an attacker to execute arbitrary OS commands on a system running mcp-remote when connecting to a malicious MCP server. In Windows environments, this can lead to full control over the operating system, while in macOS and Linux, it allows for the execution of arbitrary executables with limited control.
**Recommendations:**
Update mcp-remote to version 0.1.16.
Connect only to trusted MCP servers.
Use secure connections, such as HTTPS, when connecting to MCP servers.
Fix
RCE
OS Command Injection
Weakness Enumeration
Related Identifiers
Affected Products
References · 42
- https://github.com/geelen/mcp-remote/commit/607b226a356cb61a239ffaba2fb3db1c9dea4bac⭐ 732 🔗 81 · Patch
- https://osv.dev/vulnerability/GHSA-6xpm-ggf7-wc3p · Vendor Advisory
- https://osv.dev/vulnerability/CVE-2025-6514 · Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-6514 · Security Note
- https://github.com/geelen/mcp-remote⭐ 736 🔗 81 · Note
- https://twitter.com/_cvereports/status/1943598220711469472 · Twitter Post
- https://reddit.com/r/devsecops/comments/1lxeu3s/new_mcp_critical_vulnerability · Reddit Post
- https://t.me/c/1518255631/807575 · Telegram Post
- https://twitter.com/CheckmarxZero/status/1945111946824421446 · Twitter Post
- https://twitter.com/_r_netsec/status/1945528378318360609 · Twitter Post
- https://twitter.com/freedomhack101/status/1943666272677548123 · Twitter Post
- https://twitter.com/threatcluster/status/1943205137993867314 · Twitter Post
- https://twitter.com/ZeroDayFacts/status/1945389941493555458 · Twitter Post
- https://twitter.com/MCP_Community/status/1943792372585746433 · Twitter Post
- https://twitter.com/TobinSouth/status/1943637882935050474 · Twitter Post