Back to Blog
MCP Vulnerabilities 2025-2026: 16+ CVEs & Breach Index
AI AuditsAIMCPHacks

MCP Vulnerabilities 2025-2026: 16+ CVEs & Breach Index

13 min

TL;DR

  • 16 publicly disclosed MCP-related security incidents between April 2025 and April 2026.
  • At least 14 CVEs across the stack, including 5 with CVSS ≥ 9.0 (Critical) and several "by-design" issues that Anthropic has explicitly declined to patch.
  • April 2026's "Mother of all AI supply chains" disclosure exposed ~7,000 public MCP servers running official SDKs (Python, TypeScript, Java, Rust) — 150M+ combined downloads inherit the same flaw.
  • The OWASP Top 10 for Agentic Applications cites the Postmark MCP supply-chain attack as the canonical example of MCP Impersonation under ASI04.
  • 82% of MCP servers use file operations prone to path traversal (Endor Labs); 53% rely on long-lived static credentials (Astrix Security); 1,467 MCP servers are now exposed to the public internet — nearly tripled in 6 months (Trend Micro).
This index is updated as new MCP disclosures land. Bookmark it, link to it, send it to anyone arguing that MCP is "production-ready by default."

Why this index exists

The Model Context Protocol turned 18 months old in May 2026. In that time it became the dominant interface between LLMs and the external world — and the dominant attack surface for AI-driven systems. There is no single canonical record of MCP-related breaches, CVEs, and disclosures. There should be.
This page is that record. Every entry below is sourced to an official advisory, an NVD-catalogued CVE, or a disclosure from a reputable security firm. We update it as new disclosures land.
If you operate an MCP deployment and you have not heard of half of these, that is the point.

The breach timeline

#DateComponentClassCVECVSSSource
1Apr 2025WhatsApp MCP (peer-server attack)Tool poisoningn/aInvariant Labs
2May 2025GitHub MCP ServerIndirect prompt injectionn/aAuthZed
3Jun 2025Asana MCP ServerCross-tenant access bypassn/aAuthZed
4Jun 2025Anthropic MCP InspectorUnauthenticated RCECVE-2025-495969.4 CriticalOligo Security
5Jul 2025mcp-remote (npm)OS command injection via OAuthCVE-2025-65149.6 CriticalAuthZed
6Jul 2025Cursor IDE MCP (dubbed "MCPoison")Tool descriptor injectionCVE-2025-541368.8 HighTrueFoundry
7Aug 2025Cursor IDE MCP (dubbed "CurXecute")Workspace-file write → RCECVE-2025-541359.8 CriticalNVD
8Aug 2025Anthropic Filesystem MCP (dubbed "EscapeRoute")Symlink / path-prefix bypassCVE-2025-53109 / CVE-2025-531107.3 HighCymulate
9Sep 2025Postmark MCP (npm)Supply-chain trojan (BCC exfil)n/aAuthZed
10Sep 2025Flowise CustomMCP nodeSTDIO transport → RCECVE-2025-5952810.0 CriticalNVD
11Oct 2025Smithery MCP RegistryPath traversal in build pipelinen/aAuthZed
12Oct 2025Framelink Figma MCPCommand injectionCVE-2025-539678.0 HighNVD
13Jan 2026Anthropic mcp-server-git3 chained flawsCVE-2025-68143 / -68144 / -681459.1 Critical (max)The Hacker News
14Jan 2026gemini-mcp-toolCommand injection via execAsyncCVE-2026-07559.8 CriticalNVD
15Mar 2026nginx-ui MCP endpointAuth bypass → RCECVE-2026-330329.8 CriticalNVD
16Apr 2026Anthropic MCP spec / official SDKs (Python, TypeScript, Java, Rust)STDIO config-to-exec, declared by-designMultiple — incl. CVE-2025-65720, CVE-2026-30615, -30617, -30618, -30623, -30624, -30625, -33224, -26015CriticalOX Security
Researcher-named exploits ("MCPoison," "CurXecute," "EscapeRoute") are not NVD-recognised brands. CVE numbers are the authoritative reference.

Patterns the breach record reveals

1. The dominant attack class is RCE — and it is getting easier

Of the 16 incidents, at least 9 result in remote code execution. Most did not require sophisticated exploitation: a malicious string in a tool description (CVE-2025-54136), a crafted authorization endpoint URL (CVE-2025-6514), or simply an unsigned npm package being installed (Postmark, gemini-mcp-tool). The MCP threat model assumes high trust between client and server. Real-world attackers do not.

2. "Tool poisoning" is now an OWASP-named pattern

Invariant Labs' April 2025 disclosure introduced Tool Poisoning Attacks as a class. Twenty months later, OWASP's Top 10 for Agentic Applications has named the same pattern as ASI04: Agentic Supply Chain Vulnerabilities, with MCP Impersonation as the worked example, and explicitly cites the Postmark supply-chain incident as the canonical case. That is the speed at which MCP attacks are graduating from research curiosity to standards-tracked threat.

3. The official SDKs are part of the attack surface

The April 2026 OX Security disclosure ("Mother of all AI supply chains") is the most consequential MCP security event to date. It is not a single-CVE vulnerability — it is an architectural decision in the official MCP STDIO transport that allows configuration values to flow directly into command execution. Anthropic's response: "behavior is by design… STDIO execution model represents a secure default and… sanitization is the developer's responsibility."
When the protocol authors decline to patch, the burden moves entirely to the operator. If you run an MCP server based on the official SDKs, you are responsible for hardening the SDK does not provide.

4. Supply-chain risk dominates the second year

Of the 7 incidents disclosed since November 2025, 5 involve some form of supply-chain or registry compromise: trojanised npm packages (Postmark, gemini-mcp-tool clones), vulnerable build pipelines (Smithery), and the systemic SDK issue. Securing the source has become as important as securing the running server.

5. CVSS understates real-world severity

EscapeRoute is rated High (7.3), not Critical — but the real-world consequence is arbitrary file read and code execution outside the configured root, on developer workstations that typically hold credentials, source code, and active session tokens. Severity scores quantify exploitability assumptions; they do not quantify what an attacker actually gets.

The numbers behind the timeline

  • 82% of MCP servers use file operations prone to path traversal — sample of 2,614 implementations (Endor Labs)
  • 53% of MCP servers rely on insecure long-lived static credentials — sample of 5,200+ open-source servers (Astrix Security)
  • 43% of MCP servers are vulnerable to command injection; 22% allow directory traversal (Equixly)
  • 1,467 MCP servers are exposed to the public internet — nearly tripled in 6 months (Trend Micro)
  • 150M+ combined downloads of the official MCP SDKs (Python, TypeScript, Java, Rust) — every download inherits the unpatched STDIO config-to-exec behaviour

What this means for AI teams

The MCP attack surface is now empirically documented across production breaches, NVD-catalogued CVEs, OWASP standards, and security-firm research. There is no longer any defensible position for treating MCP security as something to figure out later.
If you operate an MCP server in production, the minimum viable response is:
  1. Audit your SDK exposure. Identify which official SDK versions you depend on, where STDIO config flows into execution, and whether you have sanitisation in place.
  2. Audit your tool descriptors. Tool descriptions are part of your trust boundary. Treat any string read from an external source as adversarial input.
  3. Audit your supply chain. Use lockfiles. Pin versions. Verify package signatures where available. Do not auto-update MCP servers.
  4. Audit your transports. STDIO is convenient; it is not secure-by-default. SSE has been deprecated for security reasons and is still in production at thousands of organisations.
  5. Audit your cross-server boundaries. A compromised MCP server can shadow or override tools from trusted servers connected to the same agent context.
These map directly to the 24-check Zealynx MCP Security Checklist. If you'd rather have a third party do the work, our MCP Security Audit service is the production-grade version of this checklist applied to your specific deployment.

Methodology and updates

Inclusion criteria for this index:
  • Public disclosure (CVE, vendor advisory, or security-firm research post)
  • Direct relationship to the MCP protocol, an MCP server, an MCP client, or the surrounding tooling
  • Verifiable by primary source
Exclusions:

Get the Perpetuals & DEX Security Checklist

Critical security checks for perpetual DEXs and derivatives protocols before going live.

No spam. Unsubscribe anytime.

  • Theoretical or proof-of-concept attacks without production impact
  • Vulnerabilities in LLM clients that are not MCP-specific
  • Internal Zealynx audit findings (those are reported to clients, not published)
This index is reviewed weekly. If you are aware of a disclosure we should track, contact us at [email protected].

References

For deeper reading on MCP architecture and threat model:

FAQ

1. How is MCP security different from traditional API security?
MCP security differs from traditional API security because the AI agent — not the user — decides which tool to call, with what parameters, and how to interpret the response. A traditional API has deterministic control flow: the client picks an endpoint, sends typed inputs, parses a typed response. An MCP server delegates all three decisions to a non-deterministic LLM, which makes them based on prompt context that may include adversarial input from any document, file, or third-party tool the agent has touched. Every classical control assumption — input came from the authenticated user, output goes back to that same user — is weakened or inverted in the MCP threat model.
2. Have MCP vulnerabilities been exploited in production?
Yes — at least 14 MCP-related vulnerabilities have NVD-catalogued CVEs with publicly disclosed proof-of-concepts, and several have caused real production impact. Examples include Anthropic's MCP Inspector unauthenticated RCE (CVE-2025-49596, CVSS 9.4), the mcp-remote OAuth shell injection (CVE-2025-6514, CVSS 9.6), and the Flowise CustomMCP RCE (CVE-2025-59528, CVSS 10.0). The September 2025 Postmark MCP supply-chain attack actively exfiltrated email contents from organisations that installed the trojanised npm package. None of this is theoretical.
3. What is the April 2026 Anthropic MCP SDK vulnerability?
The April 2026 Anthropic MCP SDK vulnerability is a systemic STDIO transport flaw disclosed by OX Security ("Mother of all AI supply chains"), where configuration values flow directly into the command line used to spawn MCP server processes — affecting the official Python, TypeScript, Java, and Rust SDKs. Anthropic declined to patch it, stating the behavior is by design and that sanitisation is the developer's responsibility. The practical impact: ~7,000 public MCP servers and 150M+ combined downloads of the official SDKs all inherit the same exposure unless operators add sanitisation the SDK does not provide.
4. What is OWASP ASI04 (Agentic Supply Chain Vulnerabilities)?
OWASP ASI04 (Agentic Supply Chain Vulnerabilities) is item 4 of the OWASP Top 10 for Agentic Applications, released December 9, 2025. It covers supply-chain risks specific to AI agents: malicious tools, trojanised connectors, and impersonated services loaded at runtime. The OWASP document explicitly uses the Postmark MCP incident as the canonical example of MCP Impersonation, establishing it as a standards-tracked threat class rather than a one-off bug. ASI04 is one of ten items (ASI01–ASI10) in the framework.
5. Are internal-only MCP servers still vulnerable to attack?
Yes — internal-only MCP servers remain vulnerable because tool descriptors consumed by them are still parsed from external sources (documents, repositories, tickets, web pages) — and a prompt injection hiding in any of those can hijack the agent without ever crossing the network perimeter. Cross-server tool shadowing is also a strictly local risk: a single compromised internal MCP server can override or impersonate tools exposed by trusted neighbours in the same agent context. The 1,467 servers Trend Micro counted on the public internet are the visible tip; internal exposure is far larger.
6. How often is the MCP Breach Index updated?
The MCP Breach Index is reviewed weekly, with new disclosures added as soon as they're confirmed through a primary source — an NVD CVE entry, a vendor advisory, or research from a named security firm such as Invariant Labs, Oligo Security, OX Security, or Cymulate. The methodology section above lists exactly what qualifies for inclusion. If you spot a disclosure we've missed, send it to [email protected] and we'll add it on the next review.
7. Should I stop using MCP because of these vulnerabilities?
No — MCP is the dominant interface between LLMs and external tools, and avoidance is not a realistic response for any team building agentic AI today. The right response is operational discipline: pin SDK versions, treat tool descriptors as untrusted input, sanitise STDIO transport configuration, isolate cross-server boundaries, and audit every deployment as you would audit any internet-exposed service. The 24-check MCP Security Checklist operationalises this, and the OWASP Top 10 for Agentic Applications gives the standards framing.
8. How do I audit my MCP server for vulnerabilities?
To audit an MCP server for vulnerabilities, work through the 24-check MCP Security Checklist — prioritising the supply-chain and tool-descriptor categories that map directly to OWASP ASI04, plus the STDIO transport hardening relevant to the April 2026 Anthropic SDK disclosure. The checklist covers tool poisoning, prompt injection through tool responses, cross-server trust exploitation, authentication bypass, and OAuth flow injection. For a production-grade third-party assessment, Zealynx's MCP Security Audit applies the checklist plus red-team testing against the patterns documented in this index.

Glossary

TermDefinition
Tool Poisoning AttackAn attack where malicious instructions hidden inside an MCP tool's description, schema, or output hijack the AI agent's behaviour without the user's awareness.
MCP ImpersonationAn attack where a malicious MCP server poses as a legitimate service so an AI agent connecting to it executes the attacker's tools while believing it is using a trusted vendor.
STDIO TransportThe standard input/output–based transport for MCP, where the host process spawns the server as a child and communicates over its stdin and stdout streams.
Tool DescriptorThe metadata an MCP server provides to describe a tool — name, description, parameter schema, and usage notes — that an AI agent reads when deciding which tool to call.

Get the Perpetuals & DEX Security Checklist

Critical security checks for perpetual DEXs and derivatives protocols before going live.

No spam. Unsubscribe anytime.

oog
zealynx

Smart Contract Security Digest

Monthly exploit breakdowns, audit checklists, and DeFi security research — straight to your inbox

© 2026 Zealynx