PT-2025-35147 · Microsoft +1 · Vscode +1

Superboy-Zjc

·

Published

2025-08-28

·

Updated

2025-08-29

·

CVE-2025-58062

CVSS v4.0
7.3
VectorAV:N/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Name of the Vulnerable Software and Affected Versions:

openmcp-client versions prior to 0.1.12

Description:

openmcp-client, a VS Code plugin for MCP developers, contains a flaw where a malicious authorization server endpoint can be provisioned by an attacker when a user on a Windows platform connects to an attacker-controlled MCP server. This can lead to an OS command injection attack in the `open()` invocation, potentially compromising the client system.

Recommendations:

Update openmcp-client to version 0.1.12.

Fix

OS Command Injection

Weakness Enumeration

Related Identifiers

CVE-2025-58062
GHSA-43M4-P3RV-C4V8

Affected Products

Vscode
Openmcp-Client