Ad

CVE-2025-64340

MEDIUM CVSS 3.1: 6.7 EPSS 0.02%
Updated Apr 07, 2026
Fastmcp
Parameter Value
CVSS 6.7 (MEDIUM)
Fixed In 3.2.0
Type CWE-78 (OS Command Injection)
Vendor Fastmcp
Public PoC No

FastMCP is the standard framework for building MCP applications. Prior to version 3.2.0, server names containing shell metacharacters (e.g., &) can cause command injection on Windows when passed to fastmcp install claude-code or fastmcp install gemini-cli. These install paths use subprocess.run() with a list argument, but on Windows the target CLIs often resolve to .cmd wrappers that are executed through cmd.exe, which interprets metacharacters in the flattened command string.

This issue has been patched in version 3.2.0.

Attack Parameters

Attack Vector
Local
Requires local access
Attack Complexity
High
Difficult to exploit
Privileges Required
Low
Basic privileges needed
User Interaction
Required
User action required

Impact Assessment

Confidentiality
High
Complete data leak
Integrity
High
Complete data modification
Availability
High
Complete denial of service

CVSS Vector v3.1

Weakness Type (CWE)