By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Critical mcp-remote Vulnerability Enables Remote Code Execution, Impacting 437,000+ Downloads
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Critical mcp-remote Vulnerability Enables Remote Code Execution, Impacting 437,000+ Downloads
Computing

Critical mcp-remote Vulnerability Enables Remote Code Execution, Impacting 437,000+ Downloads

News Room
Last updated: 2025/07/10 at 2:21 PM
News Room Published 10 July 2025
Share
SHARE

Jul 10, 2025Ravie LakshmananVulnerability / AI Security

Cybersecurity researchers have discovered a critical vulnerability in the open-source mcp-remote project that could result in the execution of arbitrary operating system (OS) commands.

The vulnerability, tracked as CVE-2025-6514, carries a CVSS score of 9.6 out of 10.0.

“The vulnerability allows attackers to trigger arbitrary OS command execution on the machine running mcp-remote when it initiates a connection to an untrusted MCP server, posing a significant risk to users – a full system compromise,” Or Peles, JFrog Vulnerability Research Team Leader, said.

Mcp-remote is a tool that sprang forth following Anthropic’s release of Model Context Protocol (MCP), an open-source framework that standardizes the way large language model (LLM) applications integrate and share data with external data sources and services.

It acts as a local proxy, enabling MCP clients like Claude Desktop to communicate with remote MCP servers, as opposed to running them locally on the same machine as the LLM application. The npm package has been downloaded more than 437,000 times to date.

The vulnerability affects mcp-remote versions from 0.0.5 to 0.1.15. It has been addressed in version 0.1.16 released on June 17, 2025. Anyone using mcp-remote that connects to an untrusted or insecure MCP server using an affected version is at risk.

Cybersecurity

“While previously published research has demonstrated risks from MCP clients connecting to malicious MCP servers, this is the first time that full remote code execution is achieved in a real-world scenario on the client operating system when connecting to an untrusted remote MCP server,” Peles said.

The shortcoming has to do with how a malicious MCP server operated by a threat actor could embed a command during the initial communication establishment and authorization phase, which, when processed by mcp-remote, causes it to be executed on the underlying operating system.

While the issue leads to arbitrary OS command execution on Windows with full parameter control, it results in the execution of arbitrary executables with limited parameter control on macOS and Linux systems.

To mitigate the risk posed by the flaw, users are advised to update the library to the latest version and only connect to trusted MCP servers over HTTPS.

“While remote MCP servers are highly effective tools for expanding AI capabilities in managed environments, facilitating rapid iteration of code, and helping ensure more reliable delivery of software, MCP users need to be mindful of only connecting to trusted MCP servers using secure connection methods such as HTTPS,” Peles said.

“Otherwise, vulnerabilities like CVE-2025-6514 are likely to hijack MCP clients in the ever-growing MCP ecosystem.”

The disclosure comes after Oligo Security detailed a critical vulnerability in the MCP Inspector tool (CVE-2025-49596, CVSS score: 9.4) that could pave the way for remote code execution.

Earlier this month, two other high-severity security defects were uncovered in Anthropic’s Filesystem MCP Server, which, if successfully exploited, could let attackers break out of the server’s sandbox, manipulate any file on the host, and achieve code execution.

The two flaws, per Cymulate, are listed below –

  • CVE-2025-53110 (CVSS score: 7.3) – A directory containment bypass that makes it possible to access, read, or write outside of the approved directory (e.g., “/private/tmp/allowed_dir”) by using the allowed directory prefix on other directories (e.g., “/private/tmp/allow_dir_sensitive_credentials”), thereby opening the door data theft and possible privilege escalation
  • CVE-2025-53109 (CVSS score: 8.4) – A symbolic link (aka symlink) bypass stemming from poor error handling that can be used to point to any file on the file system from within the allowed directory, allowing an attacker to read or alter critical files (e.g., “/etc/sudoers”) or drop malicious code, resulting in code execution by making use of Launch Agents, cron jobs, or other persistence techniques
Cybersecurity

Both shortcomings impact all Filesystem MCP Server versions prior to 0.6.3 and 2025.7.1, which include the relevant fixes.

“This vulnerability is a serious breach of the Filesystem MCP Servers security model,” security researcher Elad Beber said about CVE-2025-53110. “Attackers can gain unauthorized access by listing, reading or writing to directories outside the allowed scope, potentially exposing sensitive files like credentials or configurations.”

“Worse, in setups where the server runs as a privileged user, this flaw could lead to privilege escalation, allowing attackers to manipulate critical system files and gain deeper control over the host system.”

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Thousands reporting problems with Microsoft Outlook
Next Article A Mexican police unit that tracks American fugitives inspired Netflix’s newest crime drama
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Qnap Myqnapcloud One, shared space in backup cloud and object storage
Mobile
Dino museum makes find deep under own parking lot
News
This Is DOGE 2.0
Gadget
$MBG Token Pre-Sale Set For July 15 — Only 7 Million Tokens Available At $0.35 | HackerNoon
Computing

You Might also Like

Computing

$MBG Token Pre-Sale Set For July 15 — Only 7 Million Tokens Available At $0.35 | HackerNoon

3 Min Read
Computing

INE Security Launches Enhanced eMAPT Certification | HackerNoon

6 Min Read
Computing

How AI-powered Marketing is Shortening the Industrial Sales Cycle | HackerNoon

10 Min Read
Computing

Habits to Improve Engineering Team Efficiency (Part 1): Design Documents | HackerNoon

8 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?