MCP Watch is a comprehensive security scanner for Model Context Protocol (MCP) servers. In 0.1.2 and earlier, the MCPScanner class contains a critical Command Injection vulnerability in the cloneRepo method. The application passes the user-supplied githubUrl argument directly to a system shell via execSync without sanitization. This allows an attacker to execute arbitrary commands on the host machine by appending shell metacharacters to the URL.
Metrics
Affected Vendors & Products
References
History
Tue, 02 Dec 2025 12:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Mcp-watch Project
Mcp-watch Project mcp-watch |
|
| Vendors & Products |
Mcp-watch Project
Mcp-watch Project mcp-watch |
Mon, 01 Dec 2025 23:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | MCP Watch is a comprehensive security scanner for Model Context Protocol (MCP) servers. In 0.1.2 and earlier, the MCPScanner class contains a critical Command Injection vulnerability in the cloneRepo method. The application passes the user-supplied githubUrl argument directly to a system shell via execSync without sanitization. This allows an attacker to execute arbitrary commands on the host machine by appending shell metacharacters to the URL. | |
| Title | MCP Watch has a Critical Command Injection in cloneRepo allows Remote Code Execution (RCE) via malicious URL | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-12-01T22:43:26.639Z
Updated: 2025-12-01T22:43:26.639Z
Reserved: 2025-11-28T23:33:56.364Z
Link: CVE-2025-66401
No data.
Status : Received
Published: 2025-12-01T23:15:53.227
Modified: 2025-12-01T23:15:53.227
Link: CVE-2025-66401
No data.