CVE-2025-66401

MCP Watch is a comprehensive security scanner for Model Context Protocol (MCP) servers. In 0.1.2 and earlier, the MCPScanner class contains a critical Command Injection vulnerability in the cloneRepo method. The application passes the user-supplied githubUrl argument directly to a system shell via execSync without sanitization. This allows an attacker to execute arbitrary commands on the host machine by appending shell metacharacters to the URL.
Configurations

No configuration.

History

01 Dec 2025, 23:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-12-01 23:15

Updated : 2025-12-02 17:16


NVD link : CVE-2025-66401

Mitre link : CVE-2025-66401

CVE.ORG link : CVE-2025-66401


JSON object : View

Products Affected

No product.

CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')