Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-pfv4-wmph-5gc6 | MCP Run Python has a Sandbox Escape & Server Takeover Vulnerability |
Tue, 10 Feb 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Mcp-run-python
Mcp-run-python mcp-run-python |
|
| Vendors & Products |
Mcp-run-python
Mcp-run-python mcp-run-python |
Mon, 09 Feb 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 09 Feb 2026 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Python code being run by 'runPython' or 'runPythonAsync' is not isolated from the rest of the JS code, allowing any Python code to use the Pyodide APIs to modify the JS environment. This may result in an attacker hijacking the MCP server - for malicious purposes including MCP tool shadowing. Note - the "mcp-run-python" project is archived and unlikely to receive a fix. | |
| Title | Lack of isolation in mcp-run-python leads to MCP server takeover | |
| Weaknesses | CWE-653 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: JFROG
Published:
Updated: 2026-02-09T12:55:24.415Z
Reserved: 2026-02-08T11:19:42.865Z
Link: CVE-2026-25905
Updated: 2026-02-09T12:55:19.471Z
Status : Deferred
Published: 2026-02-09T09:16:34.030
Modified: 2026-04-15T00:35:42.020
Link: CVE-2026-25905
No data.
OpenCVE Enrichment
Updated: 2026-04-17T21:30:28Z
Github GHSA