CVE-2026-23744
CRITICAL EXPLOITED NUCLEIMCPJam inspector <1.4.2 - RCE
Title source: llmDescription
MCPJam inspector is the local-first development platform for MCP servers. Versions 1.4.2 and earlier are vulnerable to remote code execution (RCE) vulnerability, which allows an attacker to send a crafted HTTP request that triggers the installation of an MCP server, leading to RCE. Since MCPJam inspector by default listens on 0.0.0.0 instead of 127.0.0.1, an attacker can trigger the RCE remotely via a simple HTTP request. Version 1.4.3 contains a patch.
Exploits (18)
nomisec
WORKING POC
1 stars
by boroeurnprach · remote
https://github.com/boroeurnprach/CVE-2026-23744-PoC
nomisec
WORKING POC
by d0x-awrqxavc · local
https://github.com/d0x-awrqxavc/CVE-2026-23744-HACKTHEBOX
nomisec
WORKING POC
by suljov · remote
https://github.com/suljov/CVE-2026-23744-Remote-Code-Execution-POC
nomisec
WORKING POC
by rootdirective-sec · remote
https://github.com/rootdirective-sec/CVE-2026-23744-Lab
Nuclei Templates (1)
MCPJam Inspector - Remote Code Execution
CRITICALVERIFIEDby Louay-075
Scores
CVSS v3
9.8
EPSS
0.3224
EPSS Percentile
96.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
VulnCheck KEV
2026-02-18
CWE
CWE-306
Status
published
Products (2)
mcpjam/inspector
< 1.4.3
mcpjam/inspector
0 - 1.4.3npm
Published
Jan 16, 2026
Tracked Since
Feb 18, 2026