MCP server for searching and retrieving CVE vulnerability information from NVD
npm install nvd-cve-mcp-server

A Model Context Protocol (MCP) server for retrieving and displaying CVE vulnerability information from the National Vulnerability Database (NVD). Features dual data sources with NVD API and web scraping fallback.
- š CVE Details Lookup: Retrieve complete vulnerability information by CVE ID
- š Keyword Search: Search for CVE vulnerabilities by keywords
- š Formatted Output: Display vulnerability information in elegant Markdown format
- š Dual Data Sources: API-first approach with web scraping as fallback
- š Multi-language Support: Full support for both English and Chinese
- Node.js >= 18.0.0
- npm or yarn
No installation required! Use directly with npx:
``json`
{
"mcpServers": {
"nvd-cve": {
"command": "npx",
"args": ["-y", "nvd-cve-mcp-server"]
}
}
}
`bash`
npm install -g nvd-cve-mcp-server
`bash`
npm install nvd-cve-mcp-server
Configure in Claude Desktop or other MCP-compatible applications:
macOS/Linux (~/Library/Application Support/Claude/claude_desktop_config.json):
`json`
{
"mcpServers": {
"nvd-cve": {
"command": "npx",
"args": ["-y", "nvd-cve-mcp-server"]
}
}
}
Windows (%APPDATA%\Claude\claude_desktop_config.json):
`json`
{
"mcpServers": {
"nvd-cve": {
"command": "npx",
"args": ["-y", "nvd-cve-mcp-server"]
}
}
}
`bash`
npm start
Retrieve detailed information for a specific CVE.
Parameters:
- cve_id (required): CVE ID in format CVE-YYYY-NNNNN
Example:
``
Get details for CVE-2025-13583
Output Format:
`markdownCVE-2025-13583
- CVE ID: CVE-2025-13583
- CVSS Score: 9.8
- Severity: CRITICAL
- Published: 2025-11-23
- Last Modified: 2025-11-26
- CWE Type: CWE-89
[Detailed vulnerability description]
1. VulDB
2. GitHub Issue
Search for CVE vulnerabilities by keyword.
Parameters:
- keyword (required): Search keywordlimit
- (optional): Number of results to return (default: 10, max: 20)
Example:
``
Search for CVEs related to "SQL injection"
Search for "WordPress" vulnerabilities, limit to 5 results
Output Format:
`markdownCVE Search Results: "SQL injection"
Found 10 related vulnerabilities
| CVE ID | Severity | CVSS | Published | Description |
|--------|----------|------|-----------|-------------|
| CVE-2025-13583 | CRITICAL | 9.8 | 2025-11-23 | A vulnerability has been found in code-projects... |
| CVE-2025-13582 | HIGH | 7.3 | 2025-11-23 | A vulnerability was found in code-projects... |
`
1. Query Specific CVE:
``
Please help me query CVE-2025-13583 details
2. Search Vulnerabilities:
``
Search for recent SQL injection vulnerabilities
3. Search by Product:
``
Find WordPress-related CVE vulnerabilities
1. NVD API (Primary)
- Official REST API: https://services.nvd.nist.gov/rest/json/cves/2.0
- Provides structured JSON data
- Includes complete CVSS scores, CWE classifications, etc.
2. NVD Web (Fallback)
- Web scraping when API is unavailable
- Uses Cheerio for HTML parsing
- Extracts key vulnerability information
- @modelcontextprotocol/sdk: MCP protocol implementationaxios
- : HTTP clientcheerio
- : HTML parser
`javascript`
{
id: "CVE-2025-13583",
description: "Vulnerability description...",
cvssScore: 9.8,
severity: "CRITICAL",
published: "2025-11-23T10:15:03.000",
lastModified: "2025-11-26T12:39:31.000",
references: [
{
url: "https://example.com",
source: "VulDB"
}
],
cweId: "CWE-89",
source: "api" // or "web"
}
1. API Rate Limits: NVD API has rate limits, please use responsibly
2. Network Requirements: Requires access to nvd.nist.gov
3. Data Freshness: CVE information is updated regularly, check for latest data
4. Format Validation: CVE ID must follow CVE-YYYY-NNNNN format
1. API Timeout
- Check network connection
- System will automatically switch to web scraping mode
2. CVE Not Found
- Verify CVE ID format is correct
- Check if CVE has been published to NVD
3. No Search Results
- Try using more general keywords
- Check spelling
``
nvd-cve-mcp-server/
āāā src/
ā āāā index.js # Main server code
āāā package.json # Project configuration
āāā README.md # Documentation
`bashDevelopment mode (auto-restart)
npm run dev
Issues and Pull Requests are welcome!
MIT License
SOCTeam.AI
- NPM Package
- GitHub Repository
- NVD Official Website
- NVD API Documentation
- MCP Protocol
- CVE Official Website
---
Note: This tool is for security research and educational purposes only. Please comply with relevant laws, regulations, and ethical standards.