CVE-2026-23744
CRITICAL EXPLOITED NUCLEIMCPJam inspector <1.4.2 - RCE
Title source: llmDescription
MCPJam inspector is the local-first development platform for MCP servers. Versions 1.4.2 and earlier are vulnerable to remote code execution (RCE) vulnerability, which allows an attacker to send a crafted HTTP request that triggers the installation of an MCP server, leading to RCE. Since MCPJam inspector by default listens on 0.0.0.0 instead of 127.0.0.1, an attacker can trigger the RCE remotely via a simple HTTP request. Version 1.4.3 contains a patch.
Exploits (2)
nomisec
WORKING POC
1 stars
by boroeurnprach · remote
https://github.com/boroeurnprach/CVE-2026-23744-PoC
nomisec
WORKING POC
by rootdirective-sec · remote
https://github.com/rootdirective-sec/CVE-2026-23744-Lab
Nuclei Templates (1)
MCPJam Inspector - Remote Code Execution
CRITICALVERIFIEDby Louay-075
Scores
CVSS v3
9.8
EPSS
0.1721
EPSS Percentile
94.9%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Exploitation Intel
VulnCheck KEV
2026-02-18
Classification
CWE
CWE-306
Status
draft
Affected Products (1)
mcpjam/inspector
< 1.4.3npm
Timeline
Published
Jan 16, 2026
Tracked Since
Feb 18, 2026