Nixpkgs Security Tracker

Login with GitHub

Suggestion detail

Dismissed
Permalink CVE-2026-23744
9.8 CRITICAL
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
updated 2 months ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    29 packages
    • inspector
    • appium-inspector
    • rubyPackages.gh_inspector
    • perlPackages.ClassInspector
    • haskellPackages.hs-inspector
    • rubyPackages_3_1.gh_inspector
    • rubyPackages_3_2.gh_inspector
    • rubyPackages_3_3.gh_inspector
    • rubyPackages_3_4.gh_inspector
    • rubyPackages_3_5.gh_inspector
    • perl538Packages.ClassInspector
    • perl540Packages.ClassInspector
    • python312Packages.apkinspector
    • python313Packages.apkinspector
    • haskellPackages.amazonka-inspector
    • python312Packages.debian-inspector
    • python313Packages.debian-inspector
    • haskellPackages.amazonka-inspector2
    • kdePackages.accessibility-inspector
    • python312Packages.container-inspector
    • python313Packages.container-inspector
    • python312Packages.mypy-boto3-inspector
    • python313Packages.mypy-boto3-inspector
    • python312Packages.mypy-boto3-inspector2
    • python313Packages.mypy-boto3-inspector2
    • python312Packages.types-aiobotocore-inspector
    • python313Packages.types-aiobotocore-inspector
    • python312Packages.types-aiobotocore-inspector2
    • python313Packages.types-aiobotocore-inspector2
  • @LeSuisse dismissed
REC in MCPJam inspector due to HTTP Endpoint exposes

MCPJam inspector is the local-first development platform for MCP servers. Versions 1.4.2 and earlier are vulnerable to remote code execution (RCE) vulnerability, which allows an attacker to send a crafted HTTP request that triggers the installation of an MCP server, leading to RCE. Since MCPJam inspector by default listens on 0.0.0.0 instead of 127.0.0.1, an attacker can trigger the RCE remotely via a simple HTTP request. Version 1.4.3 contains a patch.

Affected products

inspector
  • ==<= 1.4.2
Impacted software not present in nixpkgs