Overview
A critical architectural vulnerability in Anthropic’s Model Context Protocol (MCP) SDK has been disclosed by OX Security researchers, enabling arbitrary remote code execution (RCE) across any system running a vulnerable MCP implementation. The flaw is embedded in the official SDK across Python, TypeScript, Java, and Rust, and affects over 7,000 publicly accessible servers with a combined download count exceeding 150 million. Anthropic has acknowledged the behaviour but declined to modify the protocol, classifying it as ’expected’ design — leaving the broader AI ecosystem exposed.
Technical Analysis
The root cause lies in unsafe defaults within MCP’s STDIO (standard input/output) transport interface. The STDIO transport was designed to spawn a local MCP server process and return its handle to the LLM. However, the implementation accepts and executes arbitrary OS commands — if the command successfully starts an STDIO server, the handle is returned; if not, an error is returned after the command has already executed.
This means an attacker can supply any OS-level command in place of a legitimate MCP server command, achieving execution prior to any error handling or validation. Four distinct attack vectors were identified:
- Unauthenticated command injection via MCP STDIO — direct exploitation of default configurations
- Authenticated command injection with hardening bypass — circumventing basic security controls
- Zero-click prompt injection via MCP configuration edit — no user interaction required
- Supply chain injection via MCP marketplaces — malicious configurations delivered through package repositories
Affected projects include LiteLLM (CVE-2026-30623, patched), LangChain-Chatchat (CVE-2026-30617), Flowise (CVE-2026-40933), DocsGPT (CVE-2026-26015, patched), Agent Zero (CVE-2026-30624), and others. Related independent findings include CVE-2025-49596 in MCP Inspector and CVE-2026-22252 in LibreChat.
Framework Mapping
MITRE ATLAS:
- AML.T0010 (ML Supply Chain Compromise): The vulnerability is embedded in an official SDK, propagating risk to all downstream consumers.
- AML.T0051 (LLM Prompt Injection): The zero-click vector leverages prompt injection to trigger malicious STDIO configuration edits.
- AML.T0057 (LLM Data Leakage): Successful exploitation grants access to API keys, chat histories, and internal databases.
OWASP LLM Top 10:
- LLM05 (Supply Chain Vulnerabilities): Core issue originates in the official Anthropic SDK.
- LLM07 (Insecure Plugin Design): STDIO transport lacks input validation and authentication enforcement.
- LLM08 (Excessive Agency): MCP agents can execute OS-level commands beyond intended operational scope.
Impact Assessment
The blast radius is substantial. With 150 million downloads and 7,000+ exposed servers, the vulnerability touches a significant portion of the production AI agent ecosystem. Successful exploitation yields direct access to sensitive user data, API credentials, internal databases, and conversation histories. The zero-click prompt injection vector is particularly severe, requiring no user interaction and enabling automated, scalable attacks. The refusal by Anthropic to patch the underlying protocol means even patched downstream projects remain structurally at risk if the SDK behaviour is re-enabled or misconfigured.
Mitigation & Recommendations
- Apply vendor patches immediately for LiteLLM, DocsGPT, Bisheng, and any other patched frameworks in your stack.
- Restrict STDIO transport endpoints — enforce authentication on all MCP configuration interfaces and limit network exposure.
- Audit MCP marketplace integrations — inspect all third-party MCP server configurations for unexpected or injected STDIO commands.
- Implement runtime command allow-listing — constrain what commands the MCP STDIO interface is permitted to invoke at the OS level.
- Monitor for anomalous process spawning from AI agent processes as an indicator of exploitation.
References
- The Hacker News — Anthropic MCP Design Vulnerability Enables RCE
- OX Security Research Team: Moshe Siman Tov Bustan, Mustafa Naamnih, Nir Zadok, Roni Bar