Critical Bug in ‘mcp-remote’ Allows Remote Code Execution

 


                 Remote MCP support in Claude Code ...

Critical mcp-remote Vulnerability (CVE-2025-6514) Enables Remote Code Execution on Client Systems

Cybersecurity researchers have disclosed a critical remote code execution (RCE) vulnerability in the popular open-source project mcp-remote, tracked as CVE-2025-6514 with a CVSS score of 9.6. This vulnerability allows attackers to execute arbitrary operating system commands when a vulnerable MCP client connects to a malicious or untrusted remote MCP server.


The flaw poses a severe risk of full system compromise, especially in enterprise environments where AI tooling like Claude Desktop depends on MCP infrastructure for enhanced LLM workflows.


What is mcp-remote?

mcp-remote is an open-source tool created to support Anthropic’s Model Context Protocol (MCP) — a framework that standardizes how large language models (LLMs) access and interact with external data sources. Acting as a local proxy, mcp-remote allows applications to connect to remote MCP servers, offloading compute or context management without hosting locally.

Since its inception, the package has been downloaded over 437,000 times from npm.


About the Vulnerability

According to Or Peles, Vulnerability Research Lead at JFrog, the issue exists in how mcp-remote handles initial handshake and authorization messages from remote MCP servers. A malicious server can embed OS-level commands during this phase, which are then executed by the client system running mcp-remote.

“The vulnerability allows attackers to trigger arbitrary OS command execution on the machine running mcp-remote when it initiates a connection to an untrusted MCP server.”
Or Peles, JFrog

Platform-specific Impact:

  • Windows: Full OS command execution with parameter control.

  • Linux/macOS: Execution of arbitrary executables, but with limited parameter control.

Affected Versions:

  • All versions from 0.0.5 to 0.1.15

  • Fixed in version 0.1.16 (Released June 17, 2025)


Real-World Exploitation Risks

While prior research highlighted risks from malicious MCP servers, this is the first documented RCE exploit affecting real-world client systems. The implications are serious, particularly in LLM-centric environments where tools like mcp-remote serve as critical backend infrastructure.

Mitigation Recommendations:

  • Upgrade immediately to mcp-remote v0.1.16 or higher

  • Only connect to trusted MCP servers

  • Enforce HTTPS-only communication with remote endpoints


Broader MCP Ecosystem Concerns

This disclosure follows several recent high-profile vulnerabilities across the MCP ecosystem:

1. CVE-2025-49596 – MCP Inspector (CVSS 9.4)

Reported by Oligo Security. Enables RCE through insecure MCP inspection routines.

2. CVE-2025-53109 & CVE-2025-53110 – Filesystem MCP Server

Reported by Cymulate, affecting all versions prior to 0.6.3 and 2025.7.1.

  • CVE-2025-53110 (CVSS 7.3): Directory traversal flaw allows reading/writing outside the restricted scope.

  • CVE-2025-53109 (CVSS 8.4): Symlink bypass vulnerability that can be abused for persistence and privilege escalation.

“This is a serious breach of Filesystem MCP Server’s security model,”
Elad Beber, Cymulate

No comments:

Critical Bug in ‘mcp-remote’ Allows Remote Code Execution

                    Critical mcp-remote Vulnerability (CVE-2025-6514) Enables Remote Code Execution on Client Systems Cybersecurity resear...