GHSA-wvr4-3wq4-gpc5: Unauthenticated Remote Code Execution in MCP Connect /bridge Endpoint
Vulnerability ID: GHSA-WVR4-3WQ4-GPC5
CVSS Score: 9.8
Published: 2026-03-19
EvalsOne MCP Connect suffers from a critical unauthenticated remote code execution vulnerability (GHSA-wvr4-3wq4-gpc5). An insecure default configuration allows remote attackers to bypass authentication and execute arbitrary operating system commands via the /bridge endpoint.
TL;DR
A critical unauthenticated RCE flaw in MCP Connect allows attackers to execute arbitrary system commands by exploiting an unprotected /bridge endpoint. The vulnerability stems from an insecure default configuration where authentication tokens are not required.
⚠️ Exploit Status: POC
Technical Details
- CWE ID: CWE-78 (OS Command Injection) / CWE-1188 (Insecure Default)
- Attack Vector: Network
- CVSS v3.1: 9.8 (Critical)
- Authentication Required: None (in default state)
- Impact: Arbitrary Remote Code Execution
- Exploit Status: Proof of Concept Available
Affected Systems
- EvalsOne/MCP-connect
- MCP-connect: < latest
Mitigation Strategies
- Enforce explicit authentication by defining AUTH_TOKEN and ACCESS_TOKEN environment variables.
- Implement network segmentation to restrict access to the MCP Connect port.
- Execute the application using a low-privilege service account.
- Implement strict process monitoring to detect anomalous subprocess spawning.
Remediation Steps:
- Stop the running instance of MCP Connect.
- Update the deployment configuration or environment file (.env) to include highly entropic strings for AUTH_TOKEN and ACCESS_TOKEN.
- Pull the latest codebase from the official EvalsOne/MCP-connect repository.
- Restart the service and verify that unauthenticated requests to /bridge return an HTTP 401 Unauthorized status code.
References
- GitHub Advisory: GHSA-wvr4-3wq4-gpc5
- Project Repository: EvalsOne/MCP-connect
- Security Advisory: GHSA-wvr4-3wq4-gpc5
Read the full report for GHSA-WVR4-3WQ4-GPC5 on our website for more details including interactive diagrams and full exploit analysis.
Top comments (0)