← Back to feed

Anthropic MCP Architectural RCE Flaw Exposes 150M+ Downloads and 7,000+ Servers to Command Injection

Date: 2026-05-08
Tags: supply-chain, malicious-tool

Executive Summary

OX Security researchers uncovered an architectural RCE vulnerability in Anthropic's Model Context Protocol affecting 150M+ downloads and baked into official MCP SDKs across every supported programming language, with the vulnerability rippling through a supply chain with 7,000+ publicly accessible servers and up to 200,000 vulnerable instances in total. The systemic vulnerability enables Arbitrary Command Execution (RCE) on any system running a vulnerable MCP implementation, granting attackers direct access to sensitive user data, internal databases, API keys, and chat histories, and is baked into Anthropic's official MCP software development kit (SDK) across any supported language, affecting more than 7,000 publicly accessible servers and software packages totaling more than 150 million downloads.

Campaign Summary

FieldDetail
Campaign / MalwareMCP STDIO Command Injection Supply Chain Exposure
AttributionDesign flaw in Anthropic MCP implementation; exploitation vectors identified and disclosed by OX Security (confidence: high)
TargetDevelopers using MCP protocol across IDEs (Cursor, VS Code, Windsurf, Claude Code, Gemini-CLI), AI agent frameworks, and third-party MCP servers
VectorUnauthenticated command injection via STDIO-based MCP configurations; prompt injection in AI IDEs; malicious MCP marketplace distribution
Statusactive
First Observed2026-04-16

Detailed Findings

The root issue lies in MCP, an open source protocol originally developed by Anthropic that LLMs, AI applications, and agents use to connect to external data, systems, and one another, with MCP working across programming languages—any developer using Anthropic's official MCP software development kit across any supported language, including Python, TypeScript, Java, and Rust, inherits this vulnerability, and MCP uses STDIO (standard input/output) as a local transport mechanism for an AI application to spawn an MCP server as a subprocess but in practice lets anyone run any arbitrary OS command, if the command successfully creates an STDIO server it will return the handle, but when given a different command, it returns an error after the command is executed. Four distinct families of exploitation exist: unauthenticated UI injection in popular AI frameworks, hardening bypasses in protected environments like Flowise, zero-click prompt injection in leading AI IDEs (Windsurf, Cursor), and malicious marketplace distribution with 9 out of 11 MCP registries successfully poisoned with a malicious trial balloon. Anthropic declined to modify the protocol's architecture, citing the behavior as 'expected,' and researchers say a root patch could have reduced risk across software packages totaling more than 150 million downloads and protected millions of downstream users.

MITRE ATT&CK Mapping

TechniqueIDContext
Command InjectionT1059Arbitrary OS command execution via STDIO-based MCP configuration parameters without input validation
Prompt InjectionT1598Zero-click prompt injection in Windsurf (CVE-2026-30615) and other AI IDEs to modify MCP JSON configuration and register malicious STDIO servers
Supply Chain CompromiseT1195MCP server package repositories poisoned with malicious servers; affects 150M+ dependency downloads and 7,000+ exposed servers

IOCs

Domains

_CVEs issued for individual implementations: CVE-2025-49596 (MCP Inspector), CVE-2026-22252 (LibreChat), CVE-2026-22688 (WeKnora), CVE-2025-54994 (@akoskm/create-mcp-server-stdio), CVE-2025-54136 (Cursor), CVE-2026-30615 (Windsurf), CVE-2026-30625 (Upsonic), GHSA-c9gw-hvqq-f33r (Flowise). Root issue is in Anthropic's MCP SDK, not separately CVE'd._

Full URL Paths

_CVEs issued for individual implementations: CVE-2025-49596 (MCP Inspector), CVE-2026-22252 (LibreChat), CVE-2026-22688 (WeKnora), CVE-2025-54994 (@akoskm/create-mcp-server-stdio), CVE-2025-54136 (Cursor), CVE-2026-30615 (Windsurf), CVE-2026-30625 (Upsonic), GHSA-c9gw-hvqq-f33r (Flowise). Root issue is in Anthropic's MCP SDK, not separately CVE'd._

Splunk Format

_No IOCs available for Splunk query_

Package Indicators

@anthropic-ai/sdk (all versions with MCP support)
langflow (all versions)
gpt-researcher
upsonic
flowise

Detection Recommendations

Monitor for: (1) MCP STDIO configurations in IDE and framework settings that reference user-controlled or untrusted command paths; (2) direct or indirect prompt injection attempts that reference .mcp.json or MCP configuration files; (3) MCP server registrations from suspicious or newly-added packages; (4) command execution from MCP-spawned subprocesses with unusual parameters or destination IPs; (5) access to system binaries or shell interpreters from MCP client processes. Defenders should assume all MCP-connected agents have access to command execution unless explicitly sandboxed. Implement network segmentation and least-privilege IAM for systems running vulnerable MCP implementations.

References