Impact
This vulnerability allows an unauthenticated attacker to send a crafted HTTP request to MCPJam inspector, which by default listens on all network interfaces. The request triggers the installation of an MCP server, resulting in remote code execution on the host. The weakness is a missing authentication control (CWE-306) that permits unrestricted execution of privileged operations.
Affected Systems
MCPJam inspector versions 1.4.2 and earlier are affected. The product is the local-first development platform for MCP servers.
Risk and Exploitability
The issue scores a CVSS base of 9.8, an EPSS of 27%, and is not yet listed in the CISA KEV catalog. The exploit requires no authentication and can be performed from any network that can reach the HTTP endpoint, as the default binding is 0.0.0.0, making the risk high for exposed or open machines.
OpenCVE Enrichment
Github GHSA