Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Microsoft donates DocumentDB to the Linux Foundation

      August 25, 2025

      A Week In The Life Of An AI-Augmented Designer

      August 22, 2025

      This week in AI updates: Gemini Code Assist Agent Mode, GitHub’s Agents panel, and more (August 22, 2025)

      August 22, 2025

      Microsoft adds Copilot-powered debugging features for .NET in Visual Studio

      August 21, 2025

      ChatGPT is reportedly scraping Google Search data to answer your questions – here’s how

      August 26, 2025

      The 10 best early Labor Day deals live now: Save on Apple, Samsung and more

      August 26, 2025

      5 rumored Apple iPhone Fold features that have me excited (and frustrated at the same time)

      August 26, 2025

      Forget plug-and-play AI: Here’s what successful AI projects do differently

      August 26, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Log Outgoing HTTP Requests with the Laravel Spy Package

      August 26, 2025
      Recent

      Log Outgoing HTTP Requests with the Laravel Spy Package

      August 26, 2025

      devdojo/auth

      August 26, 2025

      Rust Slices: Cutting Into References the Safe Way

      August 26, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Best AI Girlfriend Simulator [2025 Working Apps and Websites]

      August 25, 2025
      Recent

      Best AI Girlfriend Simulator [2025 Working Apps and Websites]

      August 25, 2025

      8 Best Paid and Free AI Sexting Chat Apps in 2025

      August 25, 2025

      Best AI Anime Art Generator: 7 Best to Use [Free & Premium]

      August 25, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Tech & Work»JFrog finds MCP-related vulnerability, highlighting need for stronger focus on security in MCP ecosystem

    JFrog finds MCP-related vulnerability, highlighting need for stronger focus on security in MCP ecosystem

    July 11, 2025

    Earlier this week, JFrog disclosed CVE-2025-6514, a critical vulnerability in the mcp-remote project that could allow an attacker to “trigger arbitrary OS command execution on the machine running mcp-remote when it initiates a connection to an untrusted MCP server.” 

    Mcp-remote is a project that allows LLM hosts to communicate with remote MCP servers, even if they only natively support communicating with local MCP servers, JFrog explained. 

    “While previously published research has demonstrated risks from MCP clients connecting to malicious MCP servers, this is the first time that full remote code execution is achieved in a real-world scenario on the client operating system when connecting to an untrusted remote MCP server,” Or Peles, vulnerability research team leader at JFrog, wrote in a blog post.

    Glen Maddern, mcp-remote’s primary maintainer, quickly fixed the vulnerability, so anyone using mcp-remote should update to 0.1.16.  

    According to Peles, the moral of the story here is that MCP users should only connect to trusted MCP servers and should be using secure connection methods like HTTPS, since similar vulnerabilities could be found in the future. “Otherwise, vulnerabilities like CVE-2025-6514 are likely to hijack MCP clients in the ever-growing MCP ecosystem,” Peles said. 

    Addressing security concerns in the broader MCP ecosystem

    JFrog’s discovery isn’t the first vulnerability related to MCP to come to light. Other recent CVEs include CVE-2025-49596, which detailed MCP Inspector being vulnerable to remote code execution (fixed in version 0.14.1); CVE-2025-53355, which detailed a command injection vulnerability in MCP Server Kubernetes (fixed in version 2.5.0); and CVE-2025-53366, which detailed a validation error in the MCP Python SDK that could lead to an unhandled exception when processing malformed requests (fixed in version 1.9.4). 

    According to the MCP documentation, some of the most common attacks in MCP are confused deputy problems, token passthrough, and session hijacking.

    Gaetan Ferry, a security researcher at secrets management company GitGuardian, said “My current feeling about the protocol itself right now is that it’s not gatmature enough from a security perspective. So if even the protocol itself is not mature security-wise, you can’t really expect the ecosystem to be mature security-wise.”

    He predicts we’re going to continue seeing more CVEs pop up as MCP adoption increases, and noted that right now we’re seeing a new exploitation scenario roughly every two weeks.  

    He said that there isn’t yet an industry consensus on best practices for using MCP safely, but some recommendations are starting to come out. His biggest recommendation is to install servers in unique trust boundaries. For example, one installation would be only for dealing with sensitive data, and another could be designated for only working with untrusted data. 

    Despite the lack of security in MCP, Ferry believes it’s still possible to use MCP safely if you are conscious about what you are doing when you use it. GitGuardian uses MCP internally, but it has specific guidelines that must be followed and restricts the kinds of features, servers, and data they can use. 

    The problem, he said, is that MCP is so young and adoption has been quick, and often when you try to go fast, security is not the first thing that is thought about. We’re past the point of no return now, with so many already having adopted it, so now we need to move forward with security top of mind. 

    “It’s going to be a challenge for the industry, but that’s something we’ve already faced in the past every time the industry comes up with a new exciting technology,” he said. “Microservices and APIs at some point were also kind of a revolution, and we saw the same patterns like old attacks starting to work again in a new environment, and a whole new security environment needing to be built.”

    The post JFrog finds MCP-related vulnerability, highlighting need for stronger focus on security in MCP ecosystem appeared first on SD Times.

    Source: Read More 

    news
    Facebook Twitter Reddit Email Copy Link
    Previous ArticlePaddy Power and BetFair have suffered a data breach
    Next Article This week in AI dev tools: Gemini API Batch Mode, Amazon SageMaker AI updates, and more (July 11, 2025)

    Related Posts

    Tech & Work

    Microsoft donates DocumentDB to the Linux Foundation

    August 25, 2025
    Tech & Work

    A Week In The Life Of An AI-Augmented Designer

    August 22, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    Austrian deeptech Hololight secures €10M for XR pixel-streaming tech

    News & Updates

    CVE-2025-7057 – Wikimedia Foundation Mediawiki Quiz Extension Stored XSS Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    AI won’t kill UX — we will

    Web Development

    The MedusaLocker ransomware gang is hiring penetration testers

    Development

    Highlights

    CVE-2025-24798 – Meshtastic Route Crash Vulnerability (Denial of Service)

    July 10, 2025

    CVE ID : CVE-2025-24798

    Published : July 10, 2025, 10:15 p.m. | 24 minutes ago

    Description : Meshtastic is an open source mesh networking solution. From 1.2.1 until 2.6.2, a packet sent to the routing module that contains want_response==true causes a crash. This can lead to a degradation of service for nodes within range of a malicious sender, or via MQTT if downlink is enabled. This vulnerability is fixed in 2.6.2.

    Severity: 4.3 | MEDIUM

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    LogoKit Phishing Kit Used in Government, Banking and Logistics Attacks: Cyble

    July 7, 2025

    React Coverflow with Scroll-Driven Animations

    April 28, 2025

    CVE-2025-6099 – Szluyu99 Gin-Vue-Blog Remote Unauthorized Access Vulnerability

    June 15, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.