MCP Inspector is Vulnerable to Potential Command Execution via XSS When Connecting to an Untrusted MCP Server
High severity
GitHub Reviewed
Published
Sep 6, 2025
in
modelcontextprotocol/inspector
•
Updated Sep 26, 2025
Description
Published to the GitHub Advisory Database
Sep 8, 2025
Reviewed
Sep 8, 2025
Published by the National Vulnerability Database
Sep 8, 2025
Last updated
Sep 26, 2025
An XSS flaw exists in the MCP Inspector local development tool when it renders a redirect URL returned by a remote MCP server. If the Inspector connects to an untrusted server, a crafted redirect can inject script into the Inspector context and, via the built-in proxy, be leveraged to trigger arbitrary command execution on the developer machine. Version 0.16.6 hardens URL handling/validation and prevents script execution.
References