Vulnerable-MCP_Server
by Saroj-Shandiliya
Overview
Educational tool for demonstrating and testing Model Context Protocol (MCP) server vulnerabilities.
Installation
npm startEnvironment Variables
- PORT
Security Notes
This server is intentionally designed to be highly vulnerable. It contains critical SQL Injection (direct input concatenation into SQLite queries in `get_user_details`), Command Injection/Remote Code Execution (direct input passed to `child_process.exec` in `cleanup_logs`), a hidden/shadow tool (`debug_access`), simulated data exfiltration (`submit_feedback`), unauthenticated state modification/tool poisoning (`configure_server`), and a CORS misconfiguration (`Access-Control-Allow-Origin: *`). Running this in any non-isolated, non-educational environment is extremely dangerous.
Similar Servers
mcp-watch
A comprehensive security scanner for Model Context Protocol (MCP) servers, detecting various vulnerabilities in their implementations.
mcp-security-scanner
A Python-based penetration testing tool designed to scan and identify vulnerabilities in Model Context Protocol (MCP) servers.
Mcpwn
Automated security testing framework for Model Context Protocol (MCP) servers, detecting RCE, path traversal, prompt injection, and protocol vulnerabilities.
MCP-Server-Vuln-Analysis
This project documents the analysis and discovery of severe vulnerabilities in Model Context Protocol (MCP) server implementations, including Server-Side Request Forgery (SSRF) and Path Traversal, and proposes responsible disclosure.