Framelink Figma MCP Server before 0.6.3 allows an unauthenticated remote attacker to execute arbitrary operating system commands via a crafted HTTP POST request with shell metacharacters in input that is used by a fetchWithRetry curl command. The vulnerable endpoint fails to properly sanitize user-supplied input, enabling the attacker to inject malicious commands that are executed with the privileges of the MCP process. Exploitation requires network access to the MCP interface.
History

Wed, 08 Oct 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 08 Oct 2025 16:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-420
References
Metrics cvssV3_1

{'score': 8, 'vector': 'CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N'}


Wed, 08 Oct 2025 16:30:00 +0000

Type Values Removed Values Added
Description Framelink Figma MCP Server before 0.6.3 allows an unauthenticated remote attacker to execute arbitrary operating system commands via a crafted HTTP POST request with shell metacharacters in input that is used by a fetchWithRetry curl command. The vulnerable endpoint fails to properly sanitize user-supplied input, enabling the attacker to inject malicious commands that are executed with the privileges of the MCP process. Exploitation requires network access to the MCP interface.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-10-08T17:18:20.747Z

Reserved: 2025-07-16T00:00:00.000Z

Link: CVE-2025-53967

cve-icon Vulnrichment

Updated: 2025-10-08T17:18:14.591Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-10-08T17:15:34.507

Modified: 2025-10-08T19:38:09.863

Link: CVE-2025-53967

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.