CVE-2026-25546

Godot · MCP (Model Context Protocol) Server

The Godot MCP server, used for interacting with the Godot game engine, contains a vulnerability that could lead to unauthorized interactions or system compromise.

Executive summary

The Godot MCP server is affected by a high-severity vulnerability that could allow an attacker to interfere with game engine operations or execute unauthorized commands.

Vulnerability

This vulnerability resides in the Model Context Protocol (MCP) server designed for the Godot game engine. It allows for improper interaction handling, which could be exploited by an attacker to manipulate the engine's state or perform actions outside of the intended protocol constraints.

Business impact

For organizations using Godot for development, this vulnerability could lead to the theft of source code, manipulation of game assets, or unauthorized access to the development environment. The CVSS score of 7.8 indicates a High severity, as it impacts the integrity and availability of the development pipeline. This could result in significant financial loss and damage to the developer's reputation.

Remediation

Immediate Action: Update the Godot MCP server component to the latest secure version and review all server configurations.

Proactive Monitoring: Monitor MCP server logs for unusual connection patterns or malformed protocol requests.

Compensating Controls: Isolate the MCP server within a dedicated development network segment and use firewall rules to restrict access to authorized IP addresses only.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Developers should immediately update their Godot MCP server instances to mitigate the risk of unauthorized access. Ensuring that development tools are kept up-to-date is critical for maintaining the security of the software supply chain.