By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Severe Figma MCP Vulnerability Lets Hackers Execute Code Remotely — Patch Now
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Severe Figma MCP Vulnerability Lets Hackers Execute Code Remotely — Patch Now
Computing

Severe Figma MCP Vulnerability Lets Hackers Execute Code Remotely — Patch Now

News Room
Last updated: 2025/10/08 at 8:24 AM
News Room Published 8 October 2025
Share
Severe Figma MCP Vulnerability Lets Hackers Execute Code Remotely — Patch Now
SHARE

Oct 08, 2025Ravie LakshmananVulnerability / Software Security

Cybersecurity researchers have disclosed details of a now-patched vulnerability in the popular figma-developer-mcp Model Context Protocol (MCP) server that could allow attackers to achieve code execution.

The vulnerability, tracked as CVE-2025-53967 (CVSS score: 7.5), is a command injection bug stemming from the unsanitized use of user input, opening the door to a scenario where an attacker can send arbitrary system commands.

“The server constructs and executes shell commands using unvalidated user input directly within command-line strings. This introduces the possibility of shell metacharacter injection (|, >, &&, etc.),” according to a GitHub advisory for the flaw. “Successful exploitation can lead to remote code execution under the server process’s privileges.”

Given that the Framelink Figma MCP server exposes various tools to perform operations in Figma using artificial intelligence (AI)-powered coding agents like Cursor, an attacker could trick the MCP client to execute unintended actions by means of an indirect prompt injection.

DFIR Retainer Services

Cybersecurity company Imperva, which discovered and reported the problem in July 2025, described CVE-2025-53967 as a “design oversight” in the fallback mechanism that could allow bad actors to achieve full remote code execution, putting developers at risk of data exposure.

The command injection flaw “occurs during the construction of a command-line instruction used to send traffic to the Figma API endpoint,” security researcher Yohann Sillam said.

The exploitation sequence takes place over through steps –

  • The MCP client sends an Initialize request to the MCP endpoint to receive an mcp-session-id that’s used in subsequent communication with the MCP server
  • The client sends a JSONRPC request to the MCP server with the method tools/call to call tools like get_figma_data or download_figma_images

The issue, at its core, resides in “src/utils/fetch-with-retry.ts,” which first attempts to get content using the standard fetch API and, if that fails, proceeds to executing curl command via child_process.exec — which introduces the command injection flaw.

“Because the curl command is constructed by directly interpolating URL and header values into a shell command string, a malicious actor could craft a specially designed URL or header value that injects arbitrary shell commands,” Imperva said. “This could lead to remote code execution (RCE) on the host machine.”

In a proof-of-concept attack, a remote bad actor on the same network (e.g., a public Wi-Fi or a compromised corporate device) can trigger the flaw by sending the series of requests to the vulnerable MCP. Alternatively, the attacker could trick a victim into visiting a specially crafted site as part of a DNS rebinding attack.

The vulnerability has been addressed in version 0.6.3 of figma-developer-mcp, which was released on September 29, 2025. As mitigations, it’s advisable to avoid using child_process.exec with untrusted input and switch to child_process.execFile that eliminates the risk of shell interpretation.

“As AI-driven development tools continue to evolve and gain adoption, it’s essential that security considerations keep pace with innovation,” the Thales-owned company said. “This vulnerability is a stark reminder that even tools meant to run locally can become powerful entry points for attackers.”

CIS Build Kits

The development comes as FireTail revealed that Google has opted not to fix a new ASCII smuggling attack in its Gemini AI chatbot that could be weaponized to craft inputs that can slip through security filters and induce undesirable responses. Other large language models (LLMs) susceptible to this attack are DeepSeek and xAI’s Grok.

“And this flaw is particularly dangerous when LLMs, like Gemini, are deeply integrated into enterprise platforms like Google Workspace,” the company said. “This technique enables automated identity spoofing and systematic data poisoning, turning a UI flaw into a potential security nightmare.”

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Realme 15 Pro Game of Thrones Edition Launches In India With Special Box Set: Price, Specs, Design Realme 15 Pro Game of Thrones Edition Launches In India With Special Box Set: Price, Specs, Design
Next Article I stopped using Incognito mode after learning the truth I stopped using Incognito mode after learning the truth
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Critical ‘LangGrinch’ vulnerability in langchain-core puts AI agent secrets at risk –  News
Critical ‘LangGrinch’ vulnerability in langchain-core puts AI agent secrets at risk – News
News
JD.com expands into embodied AI with focus on home applications · TechNode
JD.com expands into embodied AI with focus on home applications · TechNode
Computing
The G-Lab heats up the sauce before Christmas
The G-Lab heats up the sauce before Christmas
Mobile
DeepSeek upgrades V3 model with more parameters, open-source shift · TechNode
DeepSeek upgrades V3 model with more parameters, open-source shift · TechNode
Computing

You Might also Like

JD.com expands into embodied AI with focus on home applications · TechNode
Computing

JD.com expands into embodied AI with focus on home applications · TechNode

1 Min Read
DeepSeek upgrades V3 model with more parameters, open-source shift · TechNode
Computing

DeepSeek upgrades V3 model with more parameters, open-source shift · TechNode

1 Min Read
Chinese boba tea chain Chagee files for US IPO, reports rapid expansion · TechNode
Computing

Chinese boba tea chain Chagee files for US IPO, reports rapid expansion · TechNode

2 Min Read
NIO’s mini EV firefly now costs only ,128 with battery leasing program · TechNode
Computing

NIO’s mini EV firefly now costs only $11,128 with battery leasing program · TechNode

1 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?