MCP server for NIST NVD
Starter MCP server for the NIST National Vulnerability Database (NVD) - the US government repository of standards based vulnerability management data.
The NVD includes databases of security checklist references, security-related software flaws, product names, and impact metrics.
Common Vulnerabilities and Exposures (CVE): NVD uses unique identifiers cve_id to identify vulnerabilities and to associate specific versions of code bases (e.g., software and shared libraries) with the Common Platform Enumeration (CPE) to those vulnerabilities.
Known Exploited Vulnerabilities (KEV): Subset of CVEs that have been observed in the wild and have a clear remediation action available. NVD flags CVEs considered KEVs, while the KEV catalog provides more information about required actions and mitigation.
Common Vulnerability Scoring System (CVSS): Standardized evaluation method used to supply a measure of severity. Metrics result in a numerical score ranging from 0 to 10 (CriticaL).
Common Platform Enumeration (CPE): Structured naming scheme for information technology systems, software, and packages, which helps with asset management and allows mapping vulnerabilities (CVEs) to specific systems.
CVE Foundation
KEV Catalog
Common Vulnerability Scoring System
Common Platform Enumeration
This project is not endorsed or supported by the US Government and is for personal development only.
This is an MVP, not a finished production server. It currently focuses on:
- single CVE lookup from NVD
- basic CVE search from NVD
- a simple MCP server with usage notes
- MCP server using
FastMCP nvd_get_cvetool- starter NVD API client
- starter CVE normalization service
Not yet included:
nvd_search_cvestool- CPE search
- CVE history search
- KEV client and enrichment
- retry/backoff logic
- caching
- full test coverage
- remote HTTP transport
uv sync --all-groupsNVD_API_KEY= <your key here>
NVD_API_BASE=https://services.nvd.nist.gov/rest/json
HTTP_TIMEOUT_SECONDS=30
CACHE_TTL_SECONDS=900
LOG_LEVEL=INFO
ENABLE_KEV=true
KEV_SOURCE_URL=https://www.cisa.gov/sites/default/files/feeds/known_exploited_vulnerabilities.jsonuv run python -m mcp_nvd_server.servernpx -y @modelcontextprotocol/inspectorOpen browser link created to launch Inspector. Enter the bash command from step 3 above into the Command field and click Connect. Select the tools tab and enter a CVE Id (eg. CVE-2017-0144) to test and check the response.
Returns a normalized CVE record for a single CVE ID.
Searches NVD CVEs using common filters such as keyword, CPE, severity score (CVSS), and time frame windows.
- Add tools
nvd_search_cves,nvd_search_cpes,nvd_get_cve_history - Add a KEV client and KEV lookup tools for CISA KEV Catalog
This product uses the NIST NVD API but is not endorsed or supported by NIST or any other US Government agency.