Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. mcp-run-python
  4. ›
  5. CVE-2026-25905

CVE-2026-25905: MCP Run Python has a Sandbox Escape & Server Takeover Vulnerability

February 9, 2026 (updated February 12, 2026)

Critical Sandbox Escape & Server Takeover: A critical security vulnerability exists in mcp-run-python due to a lack of isolation between the Python runtime (Pyodide) and the host JavaScript environment.

The runPython and runPythonAsync functions execute Python code using Pyodide without restricting access to the JavaScript bridge. This allows any executed Python code—whether from a user or an AI model—to access the js module in Pyodide. Through this bridge, the Python code can modify the global JavaScript environment, interact with the Node.js process, and alter the behavior of the MCP server.

Specific Attack Vector: MCP Tool Shadowing Because the Python code can modify the JS runtime, an attacker can dynamically overwrite or “shadow” existing MCP tools registered on the server. For example, an attacker could replace a secure file-reading tool with a malicious version that exfiltrates data to an external server, all while the MCP server appears to be functioning normally.

References

  • github.com/advisories/GHSA-pfv4-wmph-5gc6
  • github.com/pydantic/mcp-run-python
  • nvd.nist.gov/vuln/detail/CVE-2026-25905
  • research.jfrog.com/vulnerabilities/mcp-run-python-lack-of-isolation-mcp-takeover-jfsa-2026-001653030

Code Behaviors & Features

Detect and mitigate CVE-2026-25905 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions up to 0.0.22

Solution

Unfortunately, there is no solution available yet.

Impact 5.8 MEDIUM

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L

Learn more about CVSS

Weakness

  • CWE-653: Improper Isolation or Compartmentalization

Source file

pypi/mcp-run-python/CVE-2026-25905.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Thu, 12 Feb 2026 12:18:44 +0000.