CVE-2025-63603
BaseFortify
Publication date: 2025-11-18
Last updated on: 2026-01-02
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| mcp_server_for_data_exploration_project | mcp_server_for_data_exploration | 0.1.6 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-77 | The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a command injection flaw in the MCP Data Science Server version 0.1.6, specifically in the safe_eval() function. The function uses Python's exec() to run user-supplied scripts but does not properly restrict the __builtins__ dictionary, which means an attacker can execute arbitrary Python code with full system privileges by submitting a malicious script. This can be done without authentication or special privileges.
How can this vulnerability impact me? :
An attacker exploiting this vulnerability can execute arbitrary code on the affected system with full system privileges, potentially leading to complete system compromise. This means the attacker could take control of the server, access sensitive data, modify or delete files, and disrupt services.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, avoid using the vulnerable version 0.1.6 of MCP Data Science Server. If possible, update to a patched version where the safe_eval() function restricts the __builtins__ dictionary properly. As an immediate step, restrict or disable the run_script tool or any functionality that executes user-supplied scripts without authentication. Additionally, review and modify the safe_eval() function to explicitly define a restricted __builtins__ dictionary in the globals parameter to prevent arbitrary code execution.