incident•September 2025•2 references
Flowise CustomMCP STDIO transport RCE (CVE-2025-59528)
CriticalFlowise's CustomMCP node exposed a CVSS 10.0 path from STDIO transport handling to remote code execution.
Why it matters: Transport semantics are part of the authority plane. If the connector bridge is unsafe, every downstream tool inherits that insecurity.
Capability EscalationTool Misuse
MCP deploymentsWorkflow builders
Auditor check now
Review how transport adapters spawn and connect to local processes
Zealynx takeaway
Transport adapters deserve the same audit depth as the tools they expose.
incident•September 2025•3 references•Featured
Postmark MCP supply-chain trojan with silent BCC exfiltration
HighA trojanized Postmark MCP package on npm silently BCC'd every outbound email to an attacker-controlled inbox.
Why it matters: This is the cleanest example of MCP impersonation and agentic supply-chain failure. The connector looked legitimate while exfiltrating sensitive communication.
Skill or Plugin BackdoorsData Exfiltration
MCP deploymentsLong-lived agentsCustomer support agents
Auditor check now
Verify connector provenance, update flow, and package ownership history
Zealynx takeaway
If a connector can reach customers, counterparties, or internal inboxes, it needs the same scrutiny as a privileged SaaS integration.
incident•August 2025•3 references
Anthropic Filesystem MCP EscapeRoute path-bypass flaws
HighEscapeRoute showed that symlink and path-prefix bypasses in Anthropic's Filesystem MCP server could break assumed file-scope restrictions.
Why it matters: Filesystem scope is one of the main safety claims in agent tooling. If it can be bypassed, file-read and file-write boundaries are not trustworthy controls.
Capability EscalationTool Misuse
MCP deploymentsCoding agents
Auditor check now
Test symlink, mount, and path-normalization bypasses against file tools
Zealynx takeaway
A file tool is only as safe as its path-resolution semantics under attacker-controlled structure.
incident•August 2025•3 references•Featured
Cursor CurXecute workspace-write to RCE (CVE-2025-54135)
CriticalCurXecute showed how a workspace-file write path in Cursor could become remote code execution.
Why it matters: Coding agents collapse repository trust and execution. Once a writable workspace can shape later execution, prompt-to-sink chains become practical.
Capability EscalationTool Misuse
Coding agents
Auditor check now
Map writable files that can later influence shell, build, or IDE execution
Zealynx takeaway
For coding agents, file write authority is often just pre-execution authority with a time delay.
incident•July 2025•3 references
Cursor MCPoison tool descriptor injection (CVE-2025-54136)
HighThe MCPoison issue in Cursor showed that malicious tool descriptions could steer agent behavior through descriptor injection.
Why it matters: This demonstrates that prose policy and tool metadata can function as authorization logic when the runtime lacks robust separation.
Tool MisuseIndirect Prompt Injection
Coding agentsMCP deployments
Auditor check now
Test poisoned descriptors against real tool invocation paths
Zealynx takeaway
If a tool description can change model behavior materially, it belongs in threat modeling and incident logging.
incident•July 2025•3 references•Featured
mcp-remote OAuth shell injection (CVE-2025-6514)
CriticalA malicious authorization_endpoint value in mcp-remote's OAuth flow could trigger OS command execution during connection setup.
Why it matters: OAuth metadata looked like configuration, but in practice it became shell influence. The lesson is that remote handshake state can be part of the prompt-to-sink path.
Tool MisuseCapability Escalation
MCP deploymentsCoding agents
Auditor check now
Inspect OAuth handshake fields that flow into subprocess or shell wrappers
Zealynx takeaway
This is a textbook example of untrusted remote metadata crossing into an execution sink.
incident•June 2025•3 references
Anthropic MCP Inspector unauthenticated RCE (CVE-2025-49596)
CriticalA critical unauthenticated RCE in Anthropic's official MCP Inspector exposed developer machines to host compromise.
Why it matters: Official tooling can still be part of the attack surface. Auditors cannot assume first-party MCP infrastructure is safe by default.
Capability EscalationTool Misuse
MCP deploymentsDeveloper tooling
Auditor check now
Include inspector, debugger, and local orchestration tooling in scope
Zealynx takeaway
A serious AI audit must include developer-side companion tooling, not just the deployed agent.
incident•April 2025•3 references•Featured
WhatsApp MCP tool poisoning attack
HighInvariant Labs documented a peer-server tool poisoning attack where poisoned tool descriptions enabled silent exfiltration of WhatsApp chat history.
Why it matters: This is one of the first concrete proofs that tool descriptors themselves can act like privileged prompt injection inside a multi-tool agent runtime.
Tool MisuseData Exfiltration
MCP deploymentsMessaging agentsLong-lived agents
Auditor check now
Inspect how tool descriptors are ingested, sanitized, and diffed over time
Zealynx takeaway
When the model reads tool text as working context, descriptor text becomes policy-bearing input and deserves audit treatment.