Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-rj5c-58rq-j5g5 | FastMCP vulnerable to windows command injection in FastMCP Cursor installer via server_name |
Tue, 04 Nov 2025 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Jlowin
Jlowin fastmcp |
|
| CPEs | cpe:2.3:a:jlowin:fastmcp:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Jlowin
Jlowin fastmcp |
|
| Metrics |
cvssV3_1
|
Wed, 29 Oct 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 29 Oct 2025 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Fastmcp
Fastmcp fastmcp |
|
| Vendors & Products |
Fastmcp
Fastmcp fastmcp |
Tue, 28 Oct 2025 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | FastMCP is the standard framework for building MCP applications. Versions prior to 2.13.0, a command-injection vulnerability lets any attacker who can influence the server_name field of an MCP execute arbitrary OS commands on Windows hosts that run fastmcp install cursor. This vulnerability is fixed in 2.13.0. | |
| Title | FastMCP vulnerable to windows command injection in FastMCP Cursor installer via server_name | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-10-29T14:54:56.687Z
Reserved: 2025-10-22T18:55:48.012Z
Link: CVE-2025-62801
Updated: 2025-10-29T14:54:45.554Z
Status : Analyzed
Published: 2025-10-28T22:15:37.950
Modified: 2025-11-04T13:24:32.793
Link: CVE-2025-62801
No data.
OpenCVE Enrichment
Updated: 2025-10-29T10:57:42Z
Github GHSA