MCPJam inspector is the local-first development platform for MCP servers. Versions 1.4.2 and earlier are vulnerable to remote code execution (RCE) vulnerability, which allows an attacker to send a crafted HTTP request that triggers the installation of an MCP server, leading to RCE. Since MCPJam inspector by default listens on 0.0.0.0 instead of 127.0.0.1, an attacker can trigger the RCE remotely via a simple HTTP request. Version 1.4.3 contains a patch.
References
| Link | Resource |
|---|---|
| https://github.com/MCPJam/inspector/commit/e6b9cf9d9e6c9cbec31493b1bdca3a1255fe3e7a | Patch |
| https://github.com/MCPJam/inspector/security/advisories/GHSA-232v-j27c-5pp6 | Exploit Vendor Advisory |
Configurations
History
No history.
Information
Published : 2026-01-16 20:15
Updated : 2026-03-13 14:19
NVD link : CVE-2026-23744
Mitre link : CVE-2026-23744
CVE.ORG link : CVE-2026-23744
JSON object : View
Products Affected
mcpjam
- inspector
CWE
CWE-306
Missing Authentication for Critical Function
