The vulnerability allows attackers to trigger arbitrary OS command execution on the machine running mcp-remote when it initiates a connection to an untrusted MCP server, posing a significant risk to users - a full system compromise." Or Peles, JFrog Vulnerability Research Team Leader, said.