Anthropic MCP Flaw: Remote Command Execution in AI Supply Chain | Stack of Truths

MCP Vulnerability: Remote Command Execution in Anthropic’s AI Protocol | Stack of Truths
๐Ÿ” AI Security โ€” Supply Chain

MCP Vulnerability: Remote Command Execution in Anthropic’s AI Protocol

April 20, 2026 โ€” 5 min read โ€” Pedro Jose

A design flaw in Anthropic’s Model Context Protocol (MCP) allows attackers to run arbitrary commands on systems running vulnerable MCP implementations.

150 million+ downloads affected. 7,000+ public servers and packages. 10+ CVEs across the ecosystem.

โš ๏ธ THE REALITY

If you’re using MCP-based tools โ€” LangChain, Flowise, Cursor, Windsurf, or any of the 7,000+ affected services โ€” attackers could potentially access your data, API keys, databases, and chat histories. Remotely.

What Is the Vulnerability?

Researchers at OX Security discovered that unsafe defaults in how MCP handles STDIO (standard input/output) configuration enable Arbitrary Command Execution (RCE).

In plain English: an attacker who can send a command to an MCP server can execute code on the machine running it. The issue exists across all language implementations โ€” Python, TypeScript, Java, and Rust.

The vulnerability falls into four categories:

  • Unauthenticated command injection via MCP STDIO
  • Direct STDIO configuration with hardening bypass
  • Zero-click prompt injection editing MCP configuration
  • Hidden STDIO configurations triggered via network requests

Affected Projects (Partial List)

CVE-2025-65720 (GPT Researcher) CVE-2026-30623 (LiteLLM) โœ… Patched CVE-2026-30624 (Agent Zero) CVE-2026-30618 (Fay Framework) CVE-2026-33224 (Bisheng) โœ… Patched CVE-2026-30617 (Langchain-Chatchat) CVE-2026-30625 (Upsonic) CVE-2026-30615 (Windsurf) CVE-2026-26015 (DocsGPT) โœ… Patched CVE-2026-40933 (Flowise)

Plus: MCP Inspector (CVE-2025-49596), LibreChat (CVE-2026-22252), WeKnora (CVE-2026-22688), and Cursor (CVE-2025-54136).

Anthropic’s Response

Anthropic has declined to modify the protocol’s architecture, citing the behavior as “expected.”

Let me translate that for you: “We designed it this way. It’s working as intended. The risk is now your problem.”

OX Security put it perfectly: “Shifting responsibility to implementers does not transfer the risk. It just obscures who created it.”

What This Means for Your AI Agent

If your AI agent uses MCP โ€” directly or through a framework like LangChain or Flowise โ€” here’s what’s at risk:

  • ๐Ÿ”ด Remote code execution on your server
  • ๐Ÿ”ด Exposed API keys and credentials
  • ๐Ÿ”ด Database access and data exfiltration
  • ๐Ÿ”ด Chat history leakage
  • ๐Ÿ”ด Lateral movement to internal systems

What You Should Do Right Now

  1. Block public IP access to any MCP services
  2. Run MCP-enabled services in a sandbox/container โ€” no exceptions
  3. Monitor MCP tool invocations for anomalies
  4. Treat external MCP configuration input as untrusted
  5. Only install MCP servers from verified sources
  6. Patch affected tools immediately (LiteLLM, Bisheng, DocsGPT have patches available)
๐Ÿ”ฎ The bigger picture: This isn’t a bug. It’s a design flaw baked into a protocol used by 150 million downloads. One architectural decision propagated silently into every language, every downstream library, and every project that trusted MCP to be what it appeared to be.

This is what a supply chain vulnerability looks like in the AI era.

Can a Pentest Find This?

Yes. This is exactly the kind of vulnerability I look for.

MCP command injection, STDIO configuration bypasses, prompt injection leading to RCE โ€” these are testable attack surfaces. Automated scanners miss them. Human-led red teaming finds them.

If you’re running MCP anywhere in your stack, assume nothing. Test everything.


๐Ÿฆž๐Ÿ”

Worried about your AI agent’s security?

AI agent pentesting. Prompt injection. MCP vulnerabilities. RCE. Supply chain attacks.

I find what automated scanners miss.

๐Ÿ“ฉ DM @StackOfTruths on X

Free 15-min consultation. No hard sell. Just honest answers about your AI agent security.

๐Ÿฆž Stack of Truths โ€” Enterprise-grade security. Small business prices.
AI penetration testing ยท Supply chain security ยท MCP vulnerability assessments
ยฉ 2026 Pedro Jose โ€” trust but verify your agents.

Oh hi there ๐Ÿ‘‹
Itโ€™s nice to meet you.

Sign up to receive awesome content in your inbox, every month.

We donโ€™t spam! Read our privacy policy for more info.

Leave a Reply

Your email address will not be published. Required fields are marked *


You cannot copy content of this page

error

Enjoy this blog? Please spread the word :)

Follow by Email
YouTube
YouTube
LinkedIn
LinkedIn
Share