Description
The MCP inspector is a developer tool for testing and debugging MCP servers. A cross-site scripting issue was reported in versions of the MCP Inspector local development tool prior to 0.16.6 when connecting to untrusted remote MCP servers with a malicious redirect URI. This could be leveraged to interact directly with the inspector proxy to trigger arbitrary command execution. Users are advised to update to 0.16.6 to resolve this issue.
References (2)
Core 2
Core References
Vendor Advisory x_refsource_confirm
https://github.com/modelcontextprotocol/inspector/security/advisories/GHSA-g9hg-qhmf-q45m
Scores
CVSS v4
8.6
EPSS
0.0003
EPSS Percentile
9.9%
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
total
Details
CWE
CWE-84
Status
published
Products (2)
modelcontextprotocol/inspector
0 - 0.16.6npm
modelcontextprotocol/inspector
< 0.16.6
Published
Sep 08, 2025
Tracked Since
Feb 18, 2026