A Model Content Protocol server that provides tools to search and retrieve academic papers from PubMed database.
Config is the same across clients — only the file and path differ.
{
"mcpServers": {
"pubmed-search-mcp-server": {
"args": [
"-y",
"@gradusnikov/pubmed-search-mcp-server"
],
"command": "npx"
}
}
}Are you the author?
Add this badge to your README to show your security score and help users find safe servers.
A Model Content Protocol server that provides tools to search and retrieve academic papers from PubMed database.
Run this in your terminal to verify the server starts. Then let us know if it worked — your result helps other developers.
npx -y '@gradusnikov/pubmed-search-mcp-server' 2>&1 | head -1 && echo "✓ Server started successfully"
After testing, let us know if it worked:
Five weighted categories — click any category to see the underlying evidence.
FastMCP OpenAPI Provider has an SSRF & Path Traversal Vulnerability
## Technical Description The `OpenAPIProvider` in FastMCP exposes internal APIs to MCP clients by parsing OpenAPI specifications. The `RequestDirector` class is responsible for constructing HTTP requests to the backend service. A critical vulnerability exists in the `_build_url()` method. When an OpenAPI operation defines path parameters (e.g., `/api/v1/users/{user_id}`), the system directly substitutes parameter values into the URL template string **without URL-encoding**. Subsequently, `urll
FastMCP: Missing Consent Verification in OAuth Proxy Callback Facilitates Confused Deputy Vulnerabilities
## Summary While testing the *GitHubProvider* OAuth integration, which allows authentication to a FastMCP MCP server via a FastMCP OAuthProxy using GitHub OAuth, it was discovered that the FastMCP OAuthProxy does not properly validate the user's consent upon receiving the authorization code from GitHub. In combination with GitHub’s behavior of skipping the consent page for previously authorized clients, this introduces a Confused Deputy vulnerability. ## Technical Details An adversary can initi
FastMCP has a Command Injection vulnerability - Gemini CLI
Server names containing shell metacharacters (e.g., `&`) can cause command injection on Windows when passed to `fastmcp install claude-code` or `fastmcp install gemini-cli`. These install paths use `subprocess.run()` with a list argument, but on Windows the target CLIs often resolve to `.cmd` wrappers that are executed through `cmd.exe`, which interprets metacharacters in the flattened command string. PoC: ```python from fastmcp import FastMCP mcp = FastMCP(name="test&calc") @mcp.tool def rol
FastMCP OAuth Proxy token reuse across MCP servers
While testing the OAuth Proxy implementation, it was noticed that the server does not properly respect the `resource` parameter submitted by the client in the authorization and token request. Instead of issuing the token explicitly for this MCP server, the token is issued for the `base_url` passed to the `OAuthProxy` during initialization. **Affected File:** *https://github.com/jlowin/fastmcp/blob/main/src/fastmcp/server/auth/oauth_proxy.py#L828* **Affected Code:** ```python self._jwt_issuer:
FastMCP updated to MCP 1.23+ due to CVE-2025-66416
There was a recent CVE report on MCP: https://nvd.nist.gov/vuln/detail/CVE-2025-66416. FastMCP does not use any of the affected components of the MCP SDK directly. However, FastMCP versions prior to 2.14.0 did allow MCP SDK versions <1.23 that were vulnerable to CVE-2025-66416. Users should upgrade to FastMCP 2.14.0 or later.
Click any tool to inspect its schema.
Be the first to review
Have you used this server?
Share your experience — it helps other developers decide.
Sign in to write a review.
Others in health / education
MCP server providing seamless access to FHIR APIs for AI tools and healthcare applications
A Model Context Protocol server for searching and analyzing arXiv papers
MCP server for NotebookLM - Let your AI agents (Claude Code, Codex) research documentation directly with grounded, citation-backed answers from Gemini. Persistent auth, library management, cross-client sharing. Zero hallucinations, just your knowledge base.
MCP server for Withings health data — sleep, activity, heart, and body metrics.
MCP Security Weekly
Get CVE alerts and security updates for Pubmed Search Mcp Server and similar servers.
Start a conversation
Ask a question, share a tip, or report an issue.
Sign in to join the discussion.
A Model Content Protocol server that provides tools to search and retrieve academic papers from PubMed database.
To install pubmed-search-mcp-server for Claude Desktop automatically via Smithery:
npx -y @smithery/cli install @gradusnikov/pubmed-search-mcp-server --client claude
Clone this repository:
git clone <repository-url>
cd pubmed-search-mcp-server
Install dependencies:
pip install fastmcp requests python-dotenv
Create a .env file in the project root (if needed for configuration)
Start the server in development mode:
mcp dev pubmed_search_mcp_server.py
or add the server to Claude Desktop app CLAUDE_DIRECTORY/claude_desktop_config.json. For example if you are using Windows Subsystem for Linux (WSL) it may look like this:
"pubmed-search": {
"command": "wsl.exe",
"args": [
"bash",
"-c",
"source /home/[user]/anaconda3/etc/profile.d/conda.sh && conda activate mcp && mcp run /home/[user]/pubmed-search-mpc-server/pubmed_search_mcp_server.py"
]
},