Resources/AI Security & Hacks Library/Anthropic MCP Inspector unauthenticated RCE (CVE-2025-49596)
incidentCriticalJune 2025Confirmed3 references

Anthropic MCP Inspector unauthenticated RCE (CVE-2025-49596)

A critical unauthenticated RCE in Anthropic's official MCP Inspector exposed developer machines to host compromise.

Capability EscalationTool Misuse

Affected systems

MCP deployments, Developer tooling

Primary threats

Capability Escalation, Tool Misuse

Impact types

Unauthenticated RCE, Developer workstation compromise

CVEs

Not specified

What an auditor should now check

  • Include inspector, debugger, and local orchestration tooling in scope
  • Check whether developer tools bind unauthenticated endpoints
  • Verify workstation credentials and tokens are isolated from tool compromise

Why this matters

Official tooling can still be part of the attack surface. Auditors cannot assume first-party MCP infrastructure is safe by default.

What happened

The official MCP Inspector carried an unauthenticated remote code execution flaw. A developer-side helper became a direct host-compromise path.

Why the classification matters

This expands the audit boundary. Supporting tools can carry equal or greater authority than the runtime they help inspect.

What an auditor should now check

  • Whether local tooling exposes unauthenticated listeners
  • Whether debugging helpers are excluded from hardening reviews
  • Whether workstation credential stores are isolated from tool compromise

Zealynx takeaway

A serious AI audit must include developer-side companion tooling, not just the deployed agent.

Control implications

  • Official debugging and inspector tools belong in audit scope
  • Local developer exposure can become enterprise exposure when shared credentials are present
  • First-party tooling needs the same hardening review as third-party connectors

Affected systems

  • MCP deployments
  • Developer tooling

Impact types

  • Unauthenticated RCE
  • Developer workstation compromise

Related checklists

Smart Contract Security Digest

Monthly exploit breakdowns, audit checklists, and DeFi security research — straight to your inbox

© 2026 Zealynx