MCP Inspector - Authentication Bypass (CVE-2025-49596)
1Exploiting IPs reported
The MCP inspector is a developer tool for testing and debugging MCP servers. Versions of MCP Inspector below 0.14.1 are vulnerable to remote code execution due to lack of authentication between the Inspector client and proxy, allowing unauthenticated requests to launch MCP commands over stdio. Users should immediately upgrade to version 0.14.1 or later to address these vulnerabilities.
CrowdSec analysis
CVE-2025-49596 is a critical vulnerability in MCP Inspector versions prior to 0.14.1 that allows unauthenticated remote code execution due to missing authentication between the Inspector client and proxy. Attackers can exploit this flaw to send unauthorized requests and execute arbitrary MCP commands, potentially leading to full system compromise. Immediate upgrades to version 0.14.1 or later are strongly recommended to mitigate this severe risk.
CrowdSec has been tracking this vulnerability and its exploits since 24th of September 2025.
Based on data from the CrowdSec network, nearly all observed exploitation of CVE-2025-49596 is fully opportunistic, with attackers indiscriminately scanning the entire internet. These attacks are automated and lack any form of target selection or reconnaissance. In addition, according to the CrowdSec network, attack volume against CVE-2025-49596 has dipped slightly compared to the previous week. Although still commonly targeted, the decline suggests a cooling-off period. Long-term relevance remains, but attention is waning.
Attackers exploit unauthenticated access to the /sse endpoint with parameters like transportType=stdio and command=echo to remotely execute arbitrary MCP commands on vulnerable MCP Inspector instances. These requests do not require authentication and can be used to gain code execution on affected servers.
Exploitation
Get real-time information about exploitation attempts and actors involved.
Common Weakness Enumeration (CWE)
Protection
Find out relevant information to protect your stack against this CVE.
Blocklist
With our advanced worldwide network detection, CrowdSec can provide a list of IPs known for exploiting the vulnerability.
To increase your protection against this CVE, block exploitation attempts with this list of identified actors.