Loading HuntDB...

CVE-2025-6514

CRITICAL
Published 2025-07-09T12:41:44.921Z
Actions:

Expert Analysis

Professional remediation guidance

Get tailored security recommendations from our analyst team for CVE-2025-6514. We'll provide specific mitigation strategies based on your environment and risk profile.

CVSS Score

V3.1
9.6
/10
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
Base Score Metrics
Exploitability: N/A Impact: N/A

Attack Vector Metrics

Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED

Impact Metrics

Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH

Description

mcp-remote is exposed to OS command injection when connecting to untrusted MCP servers due to crafted input from the authorization_endpoint response URL

Available Exploits

No exploits available for this CVE.

Related News

No news articles found for this CVE.

Affected Products

Unknown Vendor

Unknown Product

Affected Versions:

0.0.5

EU Vulnerability Database

Monitored by ENISA for EU cybersecurity

EU Coordination

EU Coordinated

Exploitation Status

No Known Exploitation

ENISA Analysis

mcp-remote is exposed to OS command injection when connecting to untrusted MCP servers due to crafted input from the authorization_endpoint response URL

ENISA Scoring

CVSS Score (3.1)

9.6
/10
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

EPSS Score

0.280
probability

Data provided by ENISA EU Vulnerability Database. Last updated: July 9, 2025

GitHub Security Advisories

Community-driven vulnerability intelligence from GitHub

✓ GitHub Reviewed CRITICAL

mcp-remote exposed to OS command injection via untrusted MCP server connections

GHSA-6xpm-ggf7-wc3p

Advisory Details

mcp-remote is exposed to OS command injection when connecting to untrusted MCP servers due to crafted input from the authorization_endpoint response URL

Affected Packages

npm mcp-remote
ECOSYSTEM: ≥0.0.5 <0.1.16

CVSS Scoring

CVSS Score

9.0

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

Advisory provided by GitHub Security Advisory Database. Published: July 9, 2025, Modified: July 9, 2025

Social Media Intelligence

Real-time discussions and threat intelligence from social platforms

3 posts
Reddit 1 week, 6 days ago
crstux
Exploit

🔥 Top 10 Trending CVEs (10/08/2025) Here’s a quick breakdown of the 10 most interesting vulnerabilities trending today: **1. [CVE-2025-8088](https://nvd.nist.gov/vuln/detail/CVE-2025-8088)** - 📝 A path traversal vulnerability affecting the Windows version of WinRAR allows the attackers to execute arbitrary code by crafting malicious archive files. This vulnerability was exploited in the …

3
1
5.0
View Original High Risk
Reddit 2 weeks, 1 day ago
crstux
Exploit

🔥 Top 10 Trending CVEs (08/08/2025) Here’s a quick breakdown of the 10 most interesting vulnerabilities trending today: **1. [CVE-2025-6514](https://nvd.nist.gov/vuln/detail/CVE-2025-6514)** - 📝 mcp-remote is exposed to OS command injection when connecting to untrusted MCP servers due to crafted input from the authorization_endpoint response URL - 📅 **Published:** 09/07/2025 - 📈 …

2
2.0
View Original High Risk
Reddit 3 weeks, 4 days ago
gatewaynode

MCP RCE NVD - CVE-2025-6514

References

Published: 2025-07-09T12:41:44.921Z
Last Modified: 2025-07-09T13:06:05.402Z
Copied to clipboard!