Security researchers from Ox report that a design flaw in Anthropic’s Model Context Protocol potentially exposes 200,000 servers to remote code execution, though Anthropic maintains the behavior is expected.
Key Points
- The Model Context Protocol (MCP) vulnerability allows unauthenticated attackers to execute arbitrary OS commands on servers running AI applications.
- Researchers identified four distinct attack vectors, including command injection, hardening bypasses, and zero-click prompt injection affecting various AI development environments.
- Affected software includes popular frameworks and tools such as LangFlow, Flowise, Upsonic, and GPT Researcher, with multiple CVEs issued to date.
- Ox researchers successfully demonstrated the risk by poisoning nine out of 11 MCP marketplaces with proof-of-concept code.
- Anthropic has declined to modify the protocol's architecture, instead updating security guidance to advise developers to use STDIO-based MCP adapters with caution.