Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

F5 breach exposes BIG-IP source code — state hackers behind massive intrusion

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Apple upgrades iPad Pro, MacBook Pro, Vision Pro with new M5 chip

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Anthropic MCP Critical Vulnerability Exposes Developer Machines to Remote Exploits
Identity

Anthropic MCP Critical Vulnerability Exposes Developer Machines to Remote Exploits

userBy userJuly 1, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Cybersecurity researchers discover critical security vulnerabilities in the Model Context Protocol (MCP) Inspector project of artificial intelligence (AI) company Anthropic, causing remote code execution (RCE), allowing attackers to fully access the host.

The vulnerability tracked as CVE-2025-49596 has a CVSS score of 9.4 out of a maximum of 10.0.

“This is one of the first important RCES in the human MCP ecosystem, exposing a new browser-based class attack on AI developer tools,” Oligo Security’s Avi Lumelsky said in a report released last week.

“Code execution on a developer’s machine allows attackers to steal data, install backdoors, and move the network sideways. This can highlight the serious risks of AI teams, open source projects and enterprise adopters relying on MCPs.”

Introduced by humanity in November 2024, MCP is an open protocol that standardizes the way large-scale language model (LLM) applications integrate and share data with external data sources and tools.

The MCP Inspector is a developer tool for testing and debugging MCP servers, exposing certain features through protocols, allowing AI systems to access and interact with information beyond training data.

Cybersecurity

It contains two components. It includes a client that provides an interactive interface for testing and debugging, and a proxy server that bridges the web UI to various MCP servers.

That said, a key security consideration to keep in mind is that you should not expose your server to an untrusted network, as you have permission to generate local processes and you can connect to a designated MCP server.

This aspect, coupled with the fact that default configuration developers use it to spin up local versions of the tool, involves “critical” security risks, such as missing authentication and encryption, opening up new attack paths for each oligo.

“This misconception creates a critical attack surface as anyone with access to local networks or public internet can interact with and exploit these servers,” Lumersky said.

This attack occurs by checking for known security flaws that affect modern web browsers, called 0.0.0.0 days.

“A version of the MCP inspector below 0.14.1 is vulnerable to remote code execution due to no authentication between the inspector’s client and the proxy, allowing requests that are not permitted to invoke MCP commands via STDIO.

0.0.0.0 days is a 19-year-old vulnerability in modern web browsers that could allow malicious websites to violate local networks. This will take advantage of the fact that browsers cannot safely handle IP address 0.0.0.0, leading to code execution.

“Attackers can exploit this flaw by creating a malicious website that sends requests to a localhost service running on an MCP server, thereby gaining the ability to run arbitrary commands on the developer’s machine,” explained Lumelsky.

“The fact that the default configuration exposes MCP servers to these types of attacks means that many developers can inadvertently open backdoors to their machines.”

Specifically, concept implementation (POC) utilizes a Server-Sent Event (SSE) endpoint to dispatch malicious requests from attacker-controlled websites to achieve RCE on machines running the tool, even when listening on LocalHost (news.fyself.com).

This is because IP address 0.0.0.0 tells the operating system to listen on all IP addresses assigned to the machine, including the local loopback interface (IE, LocalHost).

Cybersecurity

In a hypothetical attack scenario, an attacker can set up a fake web page and visit and visit the developer. At that point, the malicious JavaScript embedded in the page sends a request to 0.0.0.0:6277 (the default port on which the proxy runs), and instructs the person in charge of the MCP Inspector to run the arbitrary command.

The attack can also leverage DNS rebinding techniques to create a forged DNS record pointing to 0.0.0.0:6277 or news.fyself.com:6277 to bypass security controls and gain RCE privileges.

Following the responsible disclosure in April 2025, the vulnerability was addressed by the Project Maintenance on June 13th, with version 0.14.1 being released. The fix adds a session token to the proxy server and incorporates origin validation to fully connect the attack vector.

“Localhost services may seem secure, but the network routing capabilities of browsers and MCP clients often expose them to the public internet,” says Oligo.

“The mitigation adds the authorizations that were missing by default before the fix, validates the headers of the host and origin in HTTP, and ensures that the client is actually visiting from a known trusted domain. By default, the server blocks DNS rebinding and CSRF attacks.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleAmazon will deploy 1 million robots and release a generated AI model
Next Article Automattic puts Tumblr migration on WordPress
user
  • Website

Related Posts

F5 breach exposes BIG-IP source code — state hackers behind massive intrusion

October 15, 2025

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

October 15, 2025

Over 100 VS Code extensions expose developers to hidden supply chain risks

October 15, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

F5 breach exposes BIG-IP source code — state hackers behind massive intrusion

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Apple upgrades iPad Pro, MacBook Pro, Vision Pro with new M5 chip

Group chats added to Threads as Messaging rolls out to the EU

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Revolutionize Your Workflow: TwinH Automates Tasks Without Your Presence

FySelf’s TwinH Unlocks 6 Vertical Ecosystems: Your Smart Digital Double for Every Aspect of Life

Beyond the Algorithm: How FySelf’s TwinH and Reinforcement Learning are Reshaping Future Education

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.