Back

Critical Vulnerability in MCP Protocol Exposes 200,000 AI Servers to Attacks

Severity: High (Score: 69.8)

Sources: News.Aibase, www.ox.security, Infosecurity-Magazine

Summary

On April 15, 2026, Ox Security reported a severe design flaw in Anthropic's Model Context Protocol (MCP), affecting over 200,000 AI servers. This vulnerability allows for remote code execution via the STDIO interface, which improperly executes commands without verification. Developers using MCP across multiple programming languages, including Python and Java, inherit this risk, potentially compromising sensitive data and systems. The flaw has been linked to over 150 million downloads and affects numerous open-source projects. Despite being notified of the issue in January 2026, Anthropic deemed the behavior 'expected' and made no architectural changes. Researchers demonstrated various attack vectors, including man-in-the-middle attacks and command execution through compromised servers. The vulnerability has been assigned a CVE number, highlighting the urgency for developers to address this risk immediately. Key Points: • A critical vulnerability in MCP allows remote code execution on over 200,000 servers. • Anthropic's response to the flaw has been to label it as expected behavior, with no fixes implemented. • The vulnerability affects multiple programming languages and has been linked to 150 million downloads.

Key Entities

  • Data Breach (attack_type)
  • Man-in-the-Middle (attack_type)
  • Anthropic (company)
  • OX Security (company)
  • Langflow (company)
  • GitHub (platform)
  • Java (platform)
  • Rust (platform)
  • TypeScript (platform)
  • Flowise (platform)
  • T1059 - Command and Scripting Interpreter (mitre_attack)
  • T1557 - Adversary-in-the-Middle (mitre_attack)
  • Python (tool)
  • Letta AI (tool)
  • Windsurf IDE (tool)
  • Windsurf IDE Vulnerability (vulnerability)
Loading threat details...

Threat Not Found

The threat cluster you're looking for doesn't exist or has been removed.

Return to Feed