New Webinar: Lessons for Security Leaders From Anthropic’s MCP Failure
The MCP Failure 1

The Mother of All AI Supply Chains: Critical, Systemic Vulnerability at the Core of Anthropic’s MCP

Anthropic design choice Exposes 150M+ Downloads and up to 200K Servers to complete takeover

The OX Security Research team has uncovered a critical, systemic vulnerability at the core of the Model Context Protocol (MCP) — the industry standard for AI agent communication created and maintained by Anthropic

This flaw enables Arbitrary Command Execution (RCE) on any system running a vulnerable MCP implementation, granting attackers direct access to sensitive user data, internal databases, API keys, and chat histories.

This is not a traditional coding error. It is an architectural design decision baked into Anthropic’s official MCP SDKs across every supported programming language, including Python, TypeScript, Java, and Rust. Any developer building on the Anthropic MCP foundation unknowingly inherits this exposure.

Key Findings & Blast Radius

Massive Scale: The vulnerability ripples through a supply chain with 150M+ downloads, 7,000+ publicly accessible servers — and up to 200,000 vulnerable instances in total.

Diverse Attack Vectors: Our research identifies four distinct families of exploitation, proving the flaw can be triggered via:

  1. Unauthenticated UI Injection in popular AI frameworks.
  2. Hardening Bypasses in “protected” environments like Flowise.
  3. Zero-Click Prompt Injection in leading AI IDEs (Windsurf, Cursor).
  4. Malicious Marketplace Distribution (9 out of 11 MCP registries were successfully “poisoned” with a malicious trial balloon).

Real-World Impact: We successfully executed commands on six live production platforms and identified critical vulnerabilities in industry staples like LiteLLM, LangChain, and IBM’s LangFlow.

10 CVEs Issued (and counting)

CVE IDProductAttack VectorSeverityStatus
CVE-2025-65720GPT ResearcherUI injection /
reverse shell
CriticalReported
CVE-2026-30623LiteLLMAuthenticated RCE
via JSON config
CriticalPatched
CVE-2026-30624Agent ZeroUnauthenticated
UI injection
CriticalReported
CVE-2026-30618Fay FrameworkUnauthenticated
Web-GUI RCE
CriticalReported
CVE-2026-33224BishengAuthenticated
UI injection
(Open Registration)
CriticalPatched
CVE-2026-30617Langchain-ChatchatUnauthenticated
UI injection
CriticalReported
CVE-2026-33224JaazUnauthenticated
UI injection
CriticalReported
CVE-2026-30625UpsonicAllowlist bypass
via npx/npm args
HighWarning
CVE-2026-30615WindsurfZero-click
prompt injection
to local RCE
CriticalReported
CVE-2026-26015DocsGPTMITM transport-type
substitution
CriticalPatched

Vendor Response

We repeatedly recommended root patches to Anthropic – that would have instantly protected millions of downstream users; however, they declined to modify the protocol’s architecture, citing the behavior as “expected.” We subsequently notified Anthropic of our intent to publish these findings, to which they raised no objection.

Through over 30 responsible disclosures and 10+ High/Critical CVEs, OX Security has worked to patch individual projects. However, the root cause remains unaddressed at the protocol level. 

Last week Anthropic unveiled Claude Mythos to help secure the world’s software. This research is a call to apply that same commitment closer to home — starting with a “Secure by Design” architecture and taking responsibility for the AI supply chain they created.

Timeline

Remediation: What Can You Do About it?

Block Public IP Access to Sensitive Services Sensitive services such as LLM and AI enablers and research tools are connected to highly sensitive APIs and databases, never expose them to the internet when possible.

Treat External MCP Configuration Input as Untrusted Always assume that if user input reaches downstream configurations for StdioServerParameters or similar functions, it directly exposes command execution, you should either block it completely or let user input execute only trusted pre-configured commands. 

Use Official MCP Directories Only Only Install MCP servers from verified sources (like the official GitHub MCP Registry) to avoid potentially malicious MCP servers and typosquatting attacks.

Run Your MCP Enabled Services Inside a Sandbox This would restrict permissions and mitigate access from exposed services to be able to reach external databases, configurations and API keys. Never give a server full disk access or shell execution privileges unless absolutely necessary for its specific function.

Monitor Tool Invocations Keep a close eye on what tools your AI agent is actually calling. Be wary of any “background” activity or tools that attempt to exfiltrate data to unknown external URLs. If possible, implement IP and URL blocking.

Upgrade to the Latest Versions Any of the affected services should be updated, if the service doesn’t have a fixed version, don’t expose it to user input or disable it until patched.

OX Customers

Following this research, OX Security has shipped protections across its platform.

VibeSec / AI-Generated Code OX now detects improper use of STDIO-based MCP configurations in AI-generated code, blocking patterns where user input flows directly into STDIO MCP configuration — the root pattern documented in this research.

OX Security Platform OX now flags existing STDIO MCP configurations in customer codebases where user input is present, surfacing these as actionable findings for remediation.

For More Information

FAQs

150M+ downloads, 7,000+ exposed servers, and 200+ open-source projects. OX Security executed commands on six live production platforms and produced 10+ Critical/High CVEs from this single root cause.
Anthropic confirmed the behavior is by design and declined to modify the protocol, stating the STDIO execution model represents a secure default and that sanitization is the developer’s responsibility.
Cursor, VS Code, Windsurf, Claude Code, and Gemini-CLI are all vulnerable. Windsurf (CVE-2026-30615) was the only IDE where exploitation required zero user interaction.
Anthropic could implement manifest-only execution or a command allowlist in the official SDKs, a single protocol-level change that would instantly propagate protection to every downstream library and project.

post banner image

Run Every Security Test Your Code Needs

Pinpoint, investigate and eliminate code-level issues across the entire SDLC.

Start Free
Group 1261153044

It’s time to secure your code the way software is built

Learn how VibeSec makes security part of your product creation from code to runtime