Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 02 Jan 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Mcp Server For Data Exploration Project
Mcp Server For Data Exploration Project mcp Server For Data Exploration |
|
| CPEs | cpe:2.3:a:mcp_server_for_data_exploration_project:mcp_server_for_data_exploration:0.1.6:*:*:*:*:*:*:* | |
| Vendors & Products |
Mcp Server For Data Exploration Project
Mcp Server For Data Exploration Project mcp Server For Data Exploration |
Wed, 19 Nov 2025 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Reading-plus-ai
Reading-plus-ai mcp-server-data-exploration |
|
| Vendors & Products |
Reading-plus-ai
Reading-plus-ai mcp-server-data-exploration |
Tue, 18 Nov 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-77 | |
| Metrics |
cvssV3_1
|
Tue, 18 Nov 2025 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A command injection vulnerability exists in the MCP Data Science Server's (reading-plus-ai/mcp-server-data-exploration) 0.1.6 in the safe_eval() function (src/mcp_server_ds/server.py:108). The function uses Python's exec() to execute user-supplied scripts but fails to restrict the __builtins__ dictionary in the globals parameter. When __builtins__ is not explicitly defined, Python automatically provides access to all built-in functions including __import__, exec, eval, and open. This allows an attacker to execute arbitrary Python code with full system privileges, leading to complete system compromise. The vulnerability can be exploited by submitting a malicious script to the run_script tool, requiring no authentication or special privileges. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-11-18T17:05:02.151Z
Reserved: 2025-10-27T00:00:00.000Z
Link: CVE-2025-63603
Updated: 2025-11-18T17:04:57.637Z
Status : Analyzed
Published: 2025-11-18T16:15:45.833
Modified: 2026-01-02T20:38:58.950
Link: CVE-2025-63603
No data.
OpenCVE Enrichment
Updated: 2025-11-19T10:47:47Z