mcp-cve-project
mcp
Uyari
Health Uyari
- No license — Repository has no license file
- Description — Repository has a description
- Active repo — Last push 0 days ago
- Low visibility — Only 5 GitHub stars
Code Uyari
- Code scan incomplete — No supported source files were scanned during light audit
Permissions Gecti
- Permissions — No dangerous permissions requested
Bu listing icin henuz AI raporu yok.
The Project shares all information on MCP related CVE's published
README.md
MCP-related CVE reference
This repository is a curated index of publicly disclosed Common Vulnerabilities and Exposures (CVEs) that touch the Model Context Protocol (MCP) ecosystem: official and third-party servers, SDKs, gateways, clients, and integrations where MCP is part of the attack surface or fix scope. Each linked note under cves/ summarizes the affected component, weakness class, and pointers for defenders and maintainers.
Coverage: 111 indexed CVEs (indexed below, newest first by disclosure-related date).
CVE Breakdown
2026
| S.No | Date | CVE | Affected product |
|---|---|---|---|
| 1 | 2026‑05‑12 | CVE‑2026‑5029 | Code Runner MCP Server unauthenticated RCE |
| 2 | 2026‑05‑12 | CVE‑2026‑43992 | JunoClaw MCP write-tool mnemonic exposure |
| 3 | 2026‑05‑12 | CVE‑2026‑42260 | Open-WebSearch MCP SSRF |
| 4 | 2026‑05‑11 | CVE‑2026‑45001 | OpenClaw config guard bypass affecting MCP server configuration |
| 5 | 2026‑05‑11 | CVE‑2026‑44998 | OpenClaw bundled MCP/LSP tool policy bypass |
| 6 | 2026‑05‑11 | CVE‑2026‑44995 | OpenClaw MCP stdio environment-variable code execution |
| 7 | 2026‑05‑11 | CVE‑2026‑43901 | Wireshark MCP path/export object issue |
| 8 | 2026‑05‑08 | CVE‑2026‑44694 | n8n-mcp authenticated SSRF |
| 9 | 2026‑05‑08 | CVE‑2026‑42282 | n8n-mcp sensitive tool-call arguments logged |
| 10 | 2026‑05‑08 | CVE‑2026‑41495 | n8n-mcp sensitive request data logged |
| 11 | 2026‑05‑07 | CVE‑2026‑42449 | n8n-mcp IPv4-mapped IPv6 SSRF bypass |
| 12 | 2026‑05‑05 | CVE‑2026‑35228 | Oracle MCP Server Helper Tool (SQL injection) |
| 13 | 2026‑05‑04 | CVE‑2026‑7730 | privsim/mcp-test-runner command injection |
| 14 | 2026‑05‑04 | CVE‑2026‑42236 | n8n (MCP OAuth client registration DoS) |
| 15 | 2026‑05‑04 | CVE‑2026‑42230 | n8n (MCP OAuth open redirect) |
| 16 | 2026‑05‑01 | CVE‑2026‑7591 | astro-mcp-server SQL injection |
| 17 | 2026‑04‑23 | CVE‑2026‑40933 | Flowise (MCP adapter command injection via unsafe stdio serialization) |
| 18 | 2026‑04‑23 | CVE‑2026‑30623 | LiteLLM (authenticated RCE via MCP stdio server creation) |
| 19 | 2026‑04‑20 | CVE‑2025‑66335 | Apache Doris MCP Server (doris-mcp-server; SQL injection) |
| 20 | 2026‑04‑16 | CVE‑2026‑39313 | mcp-framework |
| 21 | 2026‑04‑15 | CVE‑2026‑33224 | Bisheng (authenticated RCE via MCP stdio server configuration) |
| 22 | 2026‑04‑15 | CVE‑2026‑30625 | Upsonic (unauthenticated RCE via MCP server/task creation) |
| 23 | 2026‑04‑15 | CVE‑2026‑30624 | Agent Zero (RCE via external MCP stdio JSON configuration) |
| 24 | 2026‑04‑15 | CVE‑2026‑30618 | Fay Digital Human Framework (unauthenticated RCE via MCP adapter stdio) |
| 25 | 2026‑04‑15 | CVE‑2026‑30617 | LangChain-ChatChat (unauthenticated RCE via MCP STDIO server configuration) |
| 26 | 2026‑04‑15 | CVE‑2026‑30616 | Jaaz (RCE via MCP STDIO handling when network-exposed) |
| 27 | 2026‑04‑15 | CVE‑2026‑30615 | Windsurf (prompt injection → unauthorized MCP stdio registration / local RCE) |
| 28 | 2026‑04‑15 | CVE‑2026‑26015 | DocsGPT (RCE via tampered MCP transport to hidden stdio configuration) |
| 29 | 2026‑04‑15 | CVE‑2026‑22688 | WeKnora (untrusted MCP stdio input; cross-referenced in OX advisory) |
| 30 | 2026‑04‑15 | CVE‑2026‑22252 | LibreChat (untrusted MCP stdio input; cross-referenced in OX advisory) |
| 31 | 2026‑04‑14 | CVE‑2026‑39884 | mcp-server-kubernetes (port_forward argument injection) |
| 32 | 2026‑04‑13 | CVE‑2026‑27826 | MCP Atlassian (mcp-atlassian) (SSRF via unvalidated URL headers) |
| 33 | 2026‑04‑12 | CVE‑2026‑40576 | excel-mcp-server (path traversal in remote file handlers) |
| 34 | 2026‑04‑10 | CVE‑2026‑5059 | aws-mcp / aws-mcp-server (command injection) |
| 35 | 2026‑04‑10 | CVE‑2026‑5058 | aws-mcp / aws-mcp-server (unauthenticated command injection) |
| 36 | 2026‑04‑10 | CVE‑2026‑40159 | PraisonAI MCP integration |
| 37 | 2026‑04‑09 | CVE‑2026‑39974 | n8n-mcp (authenticated SSRF in multi-tenant HTTP mode) |
| 38 | 2026‑04‑08 | CVE‑2026‑39885 | FrontMCP / mcp-from-openapi (OpenAPI $ref SSRF) |
| 39 | 2026‑04‑07 | CVE‑2026‑35568 | MCP Java SDK (io.modelcontextprotocol.sdk) |
| 40 | 2026‑04‑07 | CVE‑2026‑34200 | Nhost CLI MCP server (authentication bypass when network-exposed) |
| 41 | 2026‑04‑03 | CVE‑2026‑27124 | FastMCP (PrefectHQ/fastmcp) (OAuth consent verification bypass / confused deputy) |
| 42 | 2026‑04‑02 | CVE‑2026‑34742 | MCP Go SDK (github.com/modelcontextprotocol/go-sdk) |
| 43 | 2026‑04‑02 | CVE‑2026‑32871 | FastMCP OpenAPI Provider (SSRF + path traversal via unencoded path params) |
| 44 | 2026‑03‑31 | CVE‑2026‑34237 | MCP Java SDK (io.modelcontextprotocol.sdk) (wildcard CORS) |
| 45 | 2026‑03‑30 | CVE‑2026‑33032 | nginx-ui MCP integration |
| 46 | 2026‑03‑29 | CVE‑2026‑5023 | codebase-mcp (OS command injection) |
| 47 | 2026‑03‑28 | CVE‑2026‑5007 | mcp-docs-rag (OS command injection) |
| 48 | 2026‑03‑27 | CVE‑2026‑33980 | Azure Data Explorer MCP Server (KQL injection) |
| 49 | 2026‑03‑27 | CVE‑2026‑33946 | MCP Ruby SDK SSE stream hijacking |
| 50 | 2026‑03‑27 | CVE‑2026‑31951 | LibreChat malicious MCP server OAuth token exfiltration |
| 51 | 2026‑03‑23 | CVE‑2026‑33252 | MCP Go SDK (HTTP transport cross-site tool execution / CSRF class) |
| 52 | 2026‑03‑16 | CVE‑2026‑4270 | AWS API MCP Server (awslabs/mcp; pip ≥0.2.14 before 1.3.9 — workdir / no-access path bypass; fixed 1.3.9) |
| 53 | 2026‑03‑13 | CVE‑2026‑31944 | LibreChat (MCP OAuth callback account takeover) |
| 54 | 2026‑03‑13 | CVE‑2026‑26118 | Azure MCP Server (azure.mcp) (SSRF) |
| 55 | 2026‑03‑10 | CVE‑2026‑27825 | MCP Atlassian (mcp-atlassian) (arbitrary file write / RCE) |
| 56 | 2026‑02‑26 | CVE‑2026‑27896 | MCP Go SDK (case-sensitivity / JSON-RPC parsing inconsistency) |
| 57 | 2026‑02‑25 | CVE‑2026‑27735 | mcp-server-git (git_add path traversal; stage files outside repo) |
| 58 | 2026‑02‑08 | CVE‑2026‑2178 | xcode-mcp-server (command injection) |
| 59 | 2026‑02‑06 | CVE‑2026‑25650 | MCP Salesforce Connector (MCP-Salesforce / mcp-salesforce-connector) (auth token disclosure) |
| 60 | 2026‑02‑04 | CVE‑2026‑25536 | MCP TypeScript SDK (cross-client data leak via shared server/transport reuse) |
| 61 | 2026‑01‑22 | CVE‑2026‑0756 | github-kanban-mcp-server (unauthenticated RCE / command injection) |
| 62 | 2026‑01‑21 | CVE‑2026‑22792 | 5ire Desktop MCP client (unsafe HTML rendering → arbitrary JS execution) |
| 63 | 2026‑01‑21 | CVE‑2026‑21852 | Claude Code pre-trust API key exfiltration in MCP-related config flow |
| 64 | 2026‑01‑16 | CVE‑2026‑23744 | MCPJam Inspector (unauthenticated RCE via exposed listener) |
| 65 | 2026‑01‑12 | CVE‑2025‑66689 | Zen MCP Server (path traversal) |
| 66 | 2026‑01‑09 | CVE‑2026‑0755 | gemini-mcp-tool (command injection via unsafe shell execution) |
| 67 | 2026‑01‑07 | CVE‑2025‑9611 | @playwright/mcp / Microsoft Playwright MCP Server (DNS rebinding; missing Origin validation) |
| 68 | 2026‑01‑07 | CVE‑2025‑67366 | @sylphxltd/filesystem-mcp (path traversal / symlink bypass) |
| 69 | 2026‑01‑05 | CVE‑2026‑0621 | MCP TypeScript SDK (UriTemplate ReDoS) |
2025
| S.No | Date | CVE | Affected product |
|---|---|---|---|
| 1 | 2026‑05‑12 | CVE‑2025‑69443 | Archon (coleam00) UI takeover / RCE and credential theft (crafted HTML) |
| 2 | 2026‑05‑12 | CVE‑2025‑65719 | kubectl-mcp-server arbitrary code execution |
| 3 | 2026‑04‑15 | CVE‑2025‑65720 | GPT Researcher (unauthenticated RCE via malicious MCP stdio configuration) |
| 4 | 2025‑12‑30 | CVE‑2025‑69256 | @serverless/mcp (command injection in Serverless Framework MCP feature) |
| 5 | 2025‑12‑17 | CVE‑2025‑68145 | mcp-server-git (repository boundary bypass via --repository) |
| 6 | 2025‑12‑17 | CVE‑2025‑68144 | mcp-server-git (argument injection in git operations) |
| 7 | 2025‑12‑17 | CVE‑2025‑68143 | mcp-server-git (git_init arbitrary path) |
| 8 | 2025‑12‑09 | CVE‑2025‑65513 | fetch-mcp SSRF (private IP validation bypass) |
| 9 | 2025‑12‑03 | CVE‑2025‑66404 | mcp-server-kubernetes (exec_in_pod command injection) |
| 10 | 2025‑12‑03 | CVE‑2025‑64443 | Docker MCP Gateway |
| 11 | 2025‑12‑03 | CVE‑2025‑20381 | Splunk MCP Server app |
| 12 | 2025‑12‑02 | CVE‑2025‑66416 | MCP Python SDK (mcp) |
| 13 | 2025‑12‑02 | CVE‑2025‑66414 | MCP TypeScript SDK (@modelcontextprotocol/sdk) |
| 14 | 2025‑12‑01 | CVE‑2025‑66401 | mcp-watch (command injection via cloneRepo URL) |
| 15 | 2025‑11‑18 | CVE‑2025‑63604 | mcp-server-aws-resources-python (code injection / AWS credential exposure) |
| 16 | 2025‑11‑18 | CVE‑2025‑63603 | MCP Data Science Server (reading-plus-ai/mcp-server-data-exploration) (unsafe exec / code execution) |
| 17 | 2025‑11‑18 | CVE‑2025‑59944 | Cursor MCP config overwrite / case-sensitivity bypass |
| 18 | 2025‑11‑15 | CVE‑2025‑61260 | OpenAI Codex CLI malicious MCP config code execution |
| 19 | 2025‑10‑29 | CVE‑2025‑64132 | Jenkins MCP Server Plugin (missing permission checks in multiple tools) |
| 20 | 2025‑10‑20 | CVE‑2025‑6515 | oatpp-mcp (predictable MCP SSE session IDs; session / prompt hijacking) |
| 21 | 2025‑10‑12 | CVE‑2025‑59163 | SafeDep vet MCP server DNS rebinding |
| 22 | 2025‑10‑08 | CVE‑2025‑53967 | Framelink Figma MCP Server RCE |
| 23 | 2025‑10‑03 | CVE‑2025‑59536 | Claude Code MCP consent/config bypass |
| 24 | 2025‑09‑24 | CVE‑2025‑59834 | adb-mcp (command injection in ADB MCP Server) |
| 25 | 2025‑09‑22 | CVE‑2025‑59528 | Flowise CustomMCP node |
| 26 | 2025‑09‑16 | CVE‑2025‑59333 | @executeautomation/database-server (read-only mode bypass) |
| 27 | 2025‑09‑08 | CVE‑2025‑58444 | MCP Inspector (@modelcontextprotocol/inspector) (XSS via untrusted redirect URL) |
| 28 | 2025‑09‑08 | CVE‑2025‑54994 | @akoskm/create-mcp-server-stdio (which-app-on-port command injection via unsafe exec; also cited in OX supply-chain advisory) |
| 29 | 2025‑08‑02 | CVE‑2025‑54136 | Cursor (trusted MCP config swap / persistent RCE via repo or local write; fixed 1.3) |
| 30 | 2025‑07‑21 | CVE‑2025‑53832 | @translated/lara-mcp / Lara Translate MCP Server (command injection via child_process.exec) |
| 31 | 2025‑07‑18 | CVE‑2025‑54073 | mcp-package-docs |
| 32 | 2025‑07‑14 | CVE‑2025‑53818 | GitHub Kanban MCP Server (command injection via gh invocation) |
| 33 | 2025‑07‑09 | CVE‑2025‑6514 | mcp-remote command injection |
| 34 | 2025‑07‑08 | CVE‑2025‑53372 | node-code-sandbox-mcp |
| 35 | 2025‑07‑08 | CVE‑2025‑53355 | mcp-server-kubernetes |
| 36 | 2025‑07‑04 | CVE‑2025‑53365 | MCP Python SDK (mcp) (DoS via unhandled exception in Streamable HTTP transport) |
| 37 | 2025‑07‑02 | CVE‑2025‑53110 | Filesystem MCP Server (@modelcontextprotocol/server-filesystem) (prefix/path collision bypass) |
| 38 | 2025‑07‑02 | CVE‑2025‑53109 | Filesystem MCP Server (@modelcontextprotocol/server-filesystem) (symlink containment bypass) |
| 39 | 2025‑07‑02 | CVE‑2025‑34072 | @modelcontextprotocol/server-slack (Slack link-unfurl data exfiltration) |
| 40 | 2025‑07‑01 | CVE‑2025‑53107 | @cyanheads/git-mcp-server |
| 41 | 2025‑06‑13 | CVE‑2025‑49596 | MCP Inspector (@modelcontextprotocol/inspector) |
| 42 | 2025‑05‑12 | CVE‑2025‑47274 | Stacklok ToolHive |
CVE Information schema (template)
| Field | Value |
|---|---|
| CVE / NVD | CVE-YYYY-NNNNN |
| Date (index) | YYYY-MM-DD |
| Affected product (index) | |
| GHSA ID | |
| GHSA category | <short label or N/A> |
| Published / disclosed | YYYY-MM-DD |
| Ecosystem | <e.g. npm, PyPI — or omit row> |
| Component | <specific component — or omit row> |
| EPSS score | |
| CVSS score | <score + version — or omit row> |
| CWE | CWE-… |
| Affected versions | |
| Fixed versions | |
| Fix status | <Patched / Unfixed / unknown / …> |
| Exploit status | <Public advisory / PoC / …> |
| Notes | <optional — or omit row> |
Contribution Rules for This Section
Use these rules in your repository contribution guide:
A vulnerability entry must include:
- CVE ID and GHSA ID, if available.
- Affected component and version.
- Fixed version or mitigation.
- Severity and source.
- Root cause category.
- Exploit / PoC safety label.
- At least one official reference.
- Defensive notes.
Do not submit:
- Unverified rumors as confirmed CVEs.
- Working exploit payloads in the README.
- Duplicate advisories without linking aliases.
- Vulnerabilities that merely mention “MCP” but have no MCP security relevance.
Yorumlar (0)
Yorum birakmak icin giris yap.
Yorum birakSonuc bulunamadi