DEV Community

CVE Reports
CVE Reports

Posted on • Originally published at cvereports.com

GHSA-WVR4-3WQ4-GPC5: GHSA-wvr4-3wq4-gpc5: Unauthenticated Remote Code Execution in MCP Connect /bridge Endpoint

GHSA-wvr4-3wq4-gpc5: Unauthenticated Remote Code Execution in MCP Connect /bridge Endpoint

Vulnerability ID: GHSA-WVR4-3WQ4-GPC5
CVSS Score: 9.8
Published: 2026-03-19

EvalsOne MCP Connect suffers from a critical unauthenticated remote code execution vulnerability (GHSA-wvr4-3wq4-gpc5). An insecure default configuration allows remote attackers to bypass authentication and execute arbitrary operating system commands via the /bridge endpoint.

TL;DR

A critical unauthenticated RCE flaw in MCP Connect allows attackers to execute arbitrary system commands by exploiting an unprotected /bridge endpoint. The vulnerability stems from an insecure default configuration where authentication tokens are not required.


⚠️ Exploit Status: POC

Technical Details

  • CWE ID: CWE-78 (OS Command Injection) / CWE-1188 (Insecure Default)
  • Attack Vector: Network
  • CVSS v3.1: 9.8 (Critical)
  • Authentication Required: None (in default state)
  • Impact: Arbitrary Remote Code Execution
  • Exploit Status: Proof of Concept Available

Affected Systems

  • EvalsOne/MCP-connect
  • MCP-connect: < latest

Mitigation Strategies

  • Enforce explicit authentication by defining AUTH_TOKEN and ACCESS_TOKEN environment variables.
  • Implement network segmentation to restrict access to the MCP Connect port.
  • Execute the application using a low-privilege service account.
  • Implement strict process monitoring to detect anomalous subprocess spawning.

Remediation Steps:

  1. Stop the running instance of MCP Connect.
  2. Update the deployment configuration or environment file (.env) to include highly entropic strings for AUTH_TOKEN and ACCESS_TOKEN.
  3. Pull the latest codebase from the official EvalsOne/MCP-connect repository.
  4. Restart the service and verify that unauthenticated requests to /bridge return an HTTP 401 Unauthorized status code.

References


Read the full report for GHSA-WVR4-3WQ4-GPC5 on our website for more details including interactive diagrams and full exploit analysis.

Top comments (0)