CVE-2025-6514
JavaScript vulnerability analysis and mitigation

Overview

CVE-2025-6514 is a critical security vulnerability (CVSS 9.6) discovered in mcp-remote, a popular tool used by Model Context Protocol (MCP) clients. The vulnerability affects mcp-remote versions 0.0.5 to 0.1.15 and was discovered and disclosed by the JFrog Security Research team. The issue allows attackers to trigger arbitrary OS command execution on machines running mcp-remote when connecting to untrusted MCP servers, potentially leading to full system compromise (JFrog Blog).

Technical details

The vulnerability stems from improper handling of the authorization_endpoint URL received during OAuth flow initialization. When mcp-remote connects to a malicious MCP server, the server can respond with a specially crafted authorization_endpoint URL value that, when processed by the open() function, leads to command injection. On Windows systems, this allows for arbitrary OS command execution with full parameter control through PowerShell's subexpression evaluation feature. On macOS and Linux, the vulnerability enables execution of arbitrary executables with limited parameter control (JFrog Blog, JFrog Research).

Impact

The vulnerability affects any user connecting to untrusted or insecure MCP servers using affected versions of mcp-remote. The impact is particularly severe as it enables full system compromise through arbitrary command execution. The tool is widely used in the AI community, especially with applications like Claude Desktop, Cursor, and Windsurf that rely on MCP for external data source connections (JFrog Blog).

Mitigation and workarounds

Two primary mitigation strategies are recommended: 1) Update mcp-remote to version 0.1.16, which includes a fix for this vulnerability (this is the recommended solution), 2) Only connect to trusted MCP Servers using HTTPS (secure connection). The vulnerability has been patched by Glen Maddern, mcp-remote's primary maintainer (JFrog Blog, GitHub Commit).

Community reactions

The discovery has prompted several LLM hosts to enhance their security measures. Cursor and Windsurf have added direct remote MCP Server connection capabilities, while Anthropic has extended this feature to Claude Desktop users with paid subscriptions. The vulnerability has raised awareness about the importance of secure connections to MCP servers in the growing MCP ecosystem (JFrog Blog).

Additional resources


SourceThis report was generated using AI

Related JavaScript vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-13158CRITICAL9.3
  • JavaScriptJavaScript
  • apidoc-core
NoNoDec 26, 2025
CVE-2025-68665HIGH8.6
  • JavaScriptJavaScript
  • @langchain/core
NoYesDec 23, 2025
CVE-2025-25341HIGH7.5
  • JavaScriptJavaScript
  • libxmljs
NoNoDec 26, 2025
CVE-2025-68475HIGH7.5
  • JavaScriptJavaScript
  • @fedify/fedify
NoYesDec 22, 2025
CVE-2025-69206MEDIUM4.3
  • JavaScriptJavaScript
  • hemmelig
NoYesDec 29, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management