PyPI: fastmcp

CVE-2025-62801

Safety vulnerability ID: SFTY-20251029-13242

Safety legacy ID: pyup.io-80984

Affected versions of the fastmcp package are vulnerable to Command Injection due to improper neutralization of the server_name value when constructing and launching a Windows deep link during the Cursor installer flow. The generate_cursor_deeplink(server_name, …) function embeds server_name directly into a cursor://… query string, which is then executed by open_deeplink() with shell=True on Windows (invoking cmd.exe /c start), allowing command metacharacters such as & or | in server_name to escape the intended command.

Created at: Nov 5, 2025Updated at: Nov 5, 2025

Overview

FastMCP vulnerable to windows command injection in FastMCP Cursor installer via server_name

Advisory

Affected versions of the fastmcp package are vulnerable to Command Injection due to improper neutralization of the server_name value when constructing and launching a Windows deep link during the Cursor installer flow. The generate_cursor_deeplink(server_name, …) function embeds server_name directly into a cursor://… query string, which is then executed by open_deeplink() with shell=True on Windows (invoking cmd.exe /c start), allowing command metacharacters such as & or | in server_name to escape the intended command.

Affected Package

Affecting fastmcp package, versions
<2.13.0

Also affects

---

How to Fix

Upgrade
fastmcp
to
2.13.0
or higher.

Mitigation and Workarounds

---

Vulnerable Functions

Functions linked to known vulnerabilities.

Vulnerable function data is available for Enterprise customers

Book a call with us to see Safety in action.

Safety

Verified by Safety

Our Cybersecurity Intelligence Team reviewed this vulnerability. We combine public data with our own research to find issues not yet reported to public sources.

Learn more