Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Anthropic MCP Design Vulnerability Enables RCE, Threatening AI Supply Chain
    Cybersecurity

    Anthropic MCP Design Vulnerability Enables RCE, Threatening AI Supply Chain

    adminBy adminApril 21, 2026No Comments3 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Anthropic MCP Design Vulnerability Enables RCE, Threatening AI Supply Chain
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Ravie LakshmananApr 20, 2026Artificial Intelligence / Vulnerability

    Cybersecurity researchers have discovered a critical “by design” weakness in the Model Context Protocol’s (MCP) architecture that could pave the way for remote code execution and have a cascading effect on the artificial intelligence (AI) supply chain.

    “This flaw enables Arbitrary Command Execution (RCE) on any system running a vulnerable MCP implementation, granting attackers direct access to sensitive user data, internal databases, API keys, and chat histories,” OX Security researchers Moshe Siman Tov Bustan, Mustafa Naamnih, Nir Zadok, and Roni Bar said in an analysis published last week.

    The cybersecurity company said the systemic vulnerability is baked into Anthropic’s official MCP software development kit (SDK) across any supported language, including Python, TypeScript, Java, and Rust. In all, it affects more than 7,000 publicly accessible servers and software packages totaling more than 150 million downloads.

    At issue are unsafe defaults in how MCP configuration works over the STDIO (standard input/output) transport interface, resulting in the discovery of 10 vulnerabilities spanning popular projects like LiteLLM, LangChain, LangFlow, Flowise, LettaAI, and LangBot –

    • CVE-2025-65720 (GPT Researcher)
    • CVE-2026-30623 (LiteLLM) – Patched
    • CVE-2026-30624 (Agent Zero)
    • CVE-2026-30618 (Fay Framework)
    • CVE-2026-33224 (Bisheng) – Patched
    • CVE-2026-30617 (Langchain-Chatchat)
    • CVE-2026-33224 (Jaaz)
    • CVE-2026-30625 (Upsonic)
    • CVE-2026-30615 (Windsurf)
    • CVE-2026-26015 (DocsGPT) – Patched
    • CVE-2026-40933 (Flowise)

    These vulnerabilities fall under four broad categories, effectively triggering remote command execution on the server –

    • Unauthenticated and authenticated command injection via MCP STDIO
    • Unauthenticated command injection via direct STDIO configuration with hardening bypass
    • Unauthenticated command injection via MCP configuration edit through zero-click prompt injection
    • Unauthenticated command injection through MCP marketplaces via network requests, triggering hidden STDIO configurations

    “Anthropic’s Model Context Protocol gives a direct configuration-to-command execution via their STDIO interface on all of their implementations, regardless of programming language,” the researchers explained.

    “As this code was meant to be used in order to start a local STDIO server, and give a handle of the STDIO back to the LLM. But in practice it actually lets anyone run any arbitrary OS command, if the command successfully creates an STDIO server it will return the handle, but when given a different command, it returns an error after the command is executed.”

    Interestingly, vulnerabilities based on the same core issue have been reported independently over the past year. They include CVE-2025-49596 (MCP Inspector), CVE-2026-22252 (LibreChat), CVE-2026-22688 (WeKnora), CVE-2025-54994 (@akoskm/create-mcp-server-stdio), and CVE-2025-54136 (Cursor).

    Anthropic, however, has declined to modify the protocol’s architecture, citing the behavior as “expected. While some of the vendors have issued patches, the shortcoming remains unaddressed in Anthropic’s MCP reference implementation, causing developers to inherit the code execution risks.

    The findings highlight how AI-powered integrations can inadvertently expand the attack surface. To counter the threat, it’s advised to block public IP access to sensitive services, monitor MCP tool invocations, run MCP-enabled services in a sandbox, treat external MCP configuration input as untrusted, and only install MCP servers from verified sources.

    “What made this a supply chain event rather than a single CVE is that one architectural decision, made once, propagated silently into every language, every downstream library, and every project that trusted the protocol to be what it appeared to be,” OX Security said. “Shifting responsibility to implementers does not transfer the risk. It just obscures who created it.”

    Anthropic Chain design enables MCP RCE Supply Threatening vulnerability
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticlePalantir Has a Human Rights Policy. Its ICE Work Tells a Different Story
    Next Article Google Lists Best Practices For Read More Deep Links
    admin
    • Website

    Related Posts

    Vercel systems targeted after third-party tool compromised

    April 21, 2026

    KelpDAO suffers $290 million heist tied to Lazarus hackers

    April 21, 2026

    Hackers Abuse QEMU for Defense Evasion

    April 21, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    JioSphere: Web Browser 6.0.3 APK Download by Jio Platforms Limited

    April 21, 2026

    Google Lists Best Practices For Read More Deep Links

    April 21, 2026

    Anthropic MCP Design Vulnerability Enables RCE, Threatening AI Supply Chain

    April 21, 2026

    Palantir Has a Human Rights Policy. Its ICE Work Tells a Different Story

    April 21, 2026
    Categories
    • Blogging (66)
    • Cybersecurity (1,420)
    • Privacy & Online Earning (175)
    • SEO & Digital Marketing (862)
    • Tech Tools & Mobile / Apps (1,708)
    • WiFi / Internet & Networking (234)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    JioSphere: Web Browser 6.0.3 APK Download by Jio Platforms Limited

    April 21, 2026

    Google Lists Best Practices For Read More Deep Links

    April 21, 2026

    Anthropic MCP Design Vulnerability Enables RCE, Threatening AI Supply Chain

    April 21, 2026
    Most Popular
    • JioSphere: Web Browser 6.0.3 APK Download by Jio Platforms Limited
    • Google Lists Best Practices For Read More Deep Links
    • Anthropic MCP Design Vulnerability Enables RCE, Threatening AI Supply Chain
    • Palantir Has a Human Rights Policy. Its ICE Work Tells a Different Story
    • Vercel systems targeted after third-party tool compromised
    • The digital PR duplication method: Rinse, reuse, repeat
    • Valve’s new Linux VRAM fix almost triples framerates in some games on the 4GB Radeon RX 6500 XT
    • KelpDAO suffers $290 million heist tied to Lazarus hackers
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.