Unprotected Alternate Channel
CVE-2025-53967
Summary
A Command Injection vulnerability exists in the "get_figma_data tool" of the figma-developer-mcp MCP Server. Unsanitized, attacker-controlled input is interpolated into a shell-invoking "child_process.exec" call, allowing injection of shell metacharacters and arbitrary system commands. Successful exploitation may result in remote code execution with the privileges of the server process, data disclosure, tampering, or Denial-of-Service. This issue affects figma-developer-mcp versions prior to 0.6.3.
- HIGH
- ADJACENT NETWORK
- HIGH
- CHANGED
- NONE
- NONE
- HIGH
- NONE
CWE-420 - Unprotected Alternate Channel
The software protects a primary channel, but it does not use the same level of protection for an alternate channel.
References
Advisory Timeline
- Published