The vulnerability arises when a client fetches a tools’ JSON specification, known as a Manual, from a remote Manual Endpoint. While a provider may initially serve a benign manual (e.g., one defining an HTTP tool call), earning the clients’ trust, a malicious provider can later change the manual to exploit the client.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Sat, 13 Dec 2025 10:15:00 +0000

Type Values Removed Values Added
Description The vulnerability arises when a client fetches a tools’ JSON specification, known as a Manual, from a remote Manual Endpoint. While a provider may initially serve a benign manual (e.g., one defining an HTTP tool call), earning the clients’ trust, a malicious provider can later change the manual to exploit the client.
Title Command execution in python-utcp allows attackers to achieve remote code execution when fetching a remote Manual from a malicious endpoint
Weaknesses CWE-501
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: JFROG

Published:

Updated: 2025-12-13T09:59:41.376Z

Reserved: 2025-12-11T13:46:59.266Z

Link: CVE-2025-14542

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-12-13T16:16:51.407

Modified: 2025-12-13T16:16:51.407

Link: CVE-2025-14542

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses