VYPR
Medium severity6.7NVD Advisory· Published Apr 3, 2026· Updated Apr 21, 2026

CVE-2025-64340

CVE-2025-64340

Description

FastMCP is the standard framework for building MCP applications. Prior to version 3.2.0, server names containing shell metacharacters (e.g., &) can cause command injection on Windows when passed to fastmcp install claude-code or fastmcp install gemini-cli. These install paths use subprocess.run() with a list argument, but on Windows the target CLIs often resolve to .cmd wrappers that are executed through cmd.exe, which interprets metacharacters in the flattened command string. This issue has been patched in version 3.2.0.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
fastmcpPyPI
< 3.2.03.2.0

Affected products

1
  • cpe:2.3:a:jlowin:fastmcp:*:*:*:*:*:*:*:*
    Range: <3.2.0

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

1