<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Windows-Mcp — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/windows-mcp/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 21 May 2026 16:47:07 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/windows-mcp/feed.xml" rel="self" type="application/rss+xml"/><item><title>Windows-MCP Unauthenticated PowerShell Control via HTTP Transports</title><link>https://feed.craftedsignal.io/briefs/2026-05-windows-mcp-rce/</link><pubDate>Thu, 21 May 2026 16:47:07 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-windows-mcp-rce/</guid><description>Windows-MCP versions prior to 0.7.5 are vulnerable to unauthenticated PowerShell control via HTTP transports due to wildcard CORS and missing authentication, allowing a remote attacker to execute arbitrary PowerShell commands as the user running Windows-MCP.</description><content:encoded><![CDATA[<p>Windows-MCP versions prior to 0.7.5 are vulnerable to a critical security flaw in the SSE and Streamable HTTP transport modes. This vulnerability exposes the MCP control plane without authentication and enables wildcard CORS handling, effectively allowing unauthenticated remote attackers to execute arbitrary PowerShell commands. The <code>PowerShell</code> tool, registered within Windows-MCP, executes caller-controlled commands as the Windows user running the application. This vulnerability arises from the composition of two design flaws: the lack of authentication in the FastMCP instance and the blanket wildcard CORS policy, which permits cross-origin browsers and non-browser HTTP clients to access the MCP control plane. This combination allows attackers to bypass typical security measures, leading to arbitrary code execution on the affected system.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker sends an HTTP OPTIONS request to the <code>/mcp</code> endpoint with a crafted <code>Origin</code> header. The server responds with wildcard CORS headers, including <code>access-control-allow-origin: *</code>.</li>
<li>Attacker sends an HTTP POST request to the <code>/mcp</code> endpoint to initialize an MCP session using the <code>initialize</code> method with a specified protocol version and client information.</li>
<li>The server creates an MCP session and returns a session ID to the attacker in the <code>mcp-session-id</code> header.</li>
<li>Attacker sends an HTTP POST request to the <code>/mcp</code> endpoint, including the previously obtained <code>Mcp-Session-Id</code> in the header.</li>
<li>The attacker calls the <code>tools/call</code> method to invoke the <code>PowerShell</code> tool.</li>
<li>The attacker includes arguments in the <code>tools/call</code> request to execute a specified PowerShell command, such as <code>calc.exe</code>.</li>
<li>The Windows-MCP application executes the attacker-supplied PowerShell command using <code>PowerShell -EncodedCommand</code>.</li>
<li>The attacker achieves arbitrary code execution on the target system as the user running Windows-MCP.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows remote attackers to execute arbitrary PowerShell commands as the user running Windows-MCP. While Chrome/Edge may block or prompt for public-site-to-localhost requests due to Local Network Access / Private Network Access behavior, the exposure still applies to same-origin/private-origin contexts, browsers or apps without this enforcement, user-approved local-network prompts, browser extensions, and non-browser HTTP clients. This can lead to complete system compromise, data exfiltration, and further malicious activities.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to Windows-MCP version 0.7.5 or later to patch the vulnerability.</li>
<li>Implement authentication for HTTP transports to prevent unauthenticated access to the MCP control plane.</li>
<li>Remove wildcard CORS from MCP control endpoints and restrict allowed origins to explicit trusted clients.</li>
<li>Enable and propagate transport security settings such as host validation.</li>
<li>Monitor web server logs for HTTP OPTIONS requests with suspicious <code>Origin</code> headers and subsequent requests to the <code>/mcp</code> endpoint using the <code>webserver</code> log source and deploy the Sigma rules in this brief to detect and alert on potential exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>remote-code-execution</category><category>windows-mcp</category><category>CORS</category></item></channel></rss>