{"id":"CVE-2025-53967","details":"Framelink Figma MCP Server before 0.6.3 allows an unauthenticated remote attacker to execute arbitrary operating system commands via a crafted HTTP POST request with shell metacharacters in input that is used by a fetchWithRetry curl command. The vulnerable endpoint fails to properly sanitize user-supplied input, enabling the attacker to inject malicious commands that are executed with the privileges of the MCP process. Exploitation requires network access to the MCP interface.","aliases":["GHSA-gxw4-4fc5-9gr5"],"modified":"2026-05-04T08:57:29.823721883Z","published":"2025-10-08T17:15:34.507Z","references":[{"type":"WEB","url":"https://github.com/GLips/Figma-Context-MCP/blob/96b3852669c5eed65e4a6e20406c25504d9196f2/src/utils/fetch-with-retry.ts#L34"},{"type":"WEB","url":"https://github.com/GLips/Figma-Context-MCP/releases/tag/v0.6.3"},{"type":"ARTICLE","url":"https://www.imperva.com/blog/another-critical-rce-discovered-in-a-popular-mcp-server/"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/GLips/Figma-Context-MCP","events":[{"introduced":"0"},{"fixed":"927f2c1984c1274f24a02bb41dafcdf92dd2e832"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"0.6.3"}]}},{"type":"GIT","repo":"https://github.com/glips/figma-context-mcp","events":[{"introduced":"0"},{"fixed":"927f2c1984c1274f24a02bb41dafcdf92dd2e832"}]}],"versions":["v0.2.2","v0.2.2-beta.0","v0.2.2-beta.1","v0.3.0","v0.3.1","v0.4.0","v0.4.1","v0.4.2","v0.4.3","v0.5.0","v0.5.1","v0.5.2","v0.6.0","v0.6.1","v0.6.2"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-53967.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N"}]}