CVE-2026-23744

9.8 CRITICAL

📋 TL;DR

MCPJam inspector versions 1.4.2 and earlier contain a critical remote code execution vulnerability. Attackers can send a crafted HTTP request that triggers installation of malicious MCP servers, leading to complete system compromise. All systems running vulnerable versions with default network configuration are affected.

💻 Affected Systems

Products:
  • MCPJam inspector
Versions: 1.4.2 and earlier
Operating Systems: All platforms running MCPJam inspector
Default Config Vulnerable: ⚠️ Yes
Notes: Default configuration binds to all interfaces (0.0.0.0) rather than localhost only, significantly increasing attack surface.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system takeover with attacker gaining full control over the host, data exfiltration, lateral movement, and persistent backdoor installation.

🟠

Likely Case

Remote code execution leading to data theft, cryptocurrency mining, or ransomware deployment on vulnerable systems.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls prevent external access to the vulnerable service.

🌐 Internet-Facing: HIGH - Default configuration binds to 0.0.0.0, making vulnerable instances accessible from the internet.
🏢 Internal Only: HIGH - Even internally, the vulnerability allows unauthenticated RCE which could facilitate lateral movement.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only a crafted HTTP request to the vulnerable endpoint. No authentication or special privileges needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.4.3

Vendor Advisory: https://github.com/MCPJam/inspector/security/advisories/GHSA-232v-j27c-5pp6

Restart Required: Yes

Instructions:

1. Stop MCPJam inspector service. 2. Update to version 1.4.3 via package manager or manual installation. 3. Restart the service. 4. Verify the service is running the patched version.

🔧 Temporary Workarounds

Network Access Restriction

linux

Configure firewall rules to restrict access to MCPJam inspector port (default 3000) to localhost only.

sudo ufw deny 3000
sudo iptables -A INPUT -p tcp --dport 3000 -s 127.0.0.1 -j ACCEPT
sudo iptables -A INPUT -p tcp --dport 3000 -j DROP

Service Binding Restriction

all

Configure MCPJam inspector to bind only to localhost interface instead of all interfaces.

Edit configuration to set bind address to 127.0.0.1 instead of 0.0.0.0

🧯 If You Can't Patch

  • Immediately implement network segmentation and firewall rules to restrict access to the vulnerable service
  • Monitor for suspicious HTTP requests to the MCPJam inspector endpoint and unusual process creation

🔍 How to Verify

Check if Vulnerable:

Check if MCPJam inspector version is 1.4.2 or earlier and if service is bound to 0.0.0.0

Check Version:

mcpjam-inspector --version or check package manager

Verify Fix Applied:

Verify version is 1.4.3 or later and service binds only to localhost interface

📡 Detection & Monitoring

Log Indicators:

  • Unusual HTTP POST requests to MCPJam inspector endpoints
  • Unexpected MCP server installation events
  • Suspicious process creation from MCPJam inspector

Network Indicators:

  • HTTP requests with crafted payloads to port 3000 from external IPs
  • Outbound connections from MCPJam inspector to suspicious domains

SIEM Query:

source="mcpjam-inspector.log" AND (http_method="POST" AND uri="/install" OR process_name="mcpjam" AND parent_process="unexpected")

🔗 References

📤 Share & Export