A critical flaw in Anthropic’s Model Context Protocol could enable arbitrary command execution and expose more than 150 million downloads and up to 200,000 servers.

Critical Anthropic MCP Flaw Exposes AI Systems to Remote Takeover

The420.in Staff
2 Min Read

A critical flaw in Anthropic’s Model Context Protocol could expose more than 150 million downloads to potential compromise and enable full system takeover across as many as 200,000 servers, according to findings by the OX Security Research team.

Architectural Flaw Spans Multiple SDKs

The researchers said the issue stems from a fundamental design decision embedded in Anthropic’s official MCP software development kits across all supported programming languages, including Python, TypeScript, Java and Rust. Unlike a conventional coding error, the flaw was described as architectural, meaning developers building on the MCP foundation may inherit the exposure from the outset.

The vulnerability enables arbitrary command execution on any system running a vulnerable MCP implementation. Successful exploitation could give attackers access to sensitive user data, internal databases, API keys and chat histories, effectively handing over complete control of the affected environment.

FCRF Returns With CDPO, Its Premier Data Protection Certification for Privacy Professionals

Researchers Cite Multiple Attack Paths

The research outlines several attack routes, including unauthenticated UI injection targeting popular AI frameworks, hardening bypasses in environments described as protected, and zero-click prompt injection in AI development tools including Windsurf and Cursor. It also points to malicious marketplace distribution, stating that 9 out of 11 MCP registries were successfully poisoned with a malicious test payload.

OX Security said it confirmed successful command execution on six live production platforms. There are vulnerabilities in LiteLLM, LangChain and IBM’s LangFlow among the affected projects.

Patches Issued in Several Cases

The research is said to have produced at least 10 CVEs across multiple high-profile projects. The material states that several critical flaws have already been patched, including CVE-2026-30623 in LiteLLM and CVE-2026-33224 in Bisheng.

There are not any response from Anthropic yet, but the findings present the flaw as a broad risk affecting systems built on vulnerable MCP implementations.

About the author – Ayesha Aayat is a law student and contributor covering cybercrime, online frauds, and digital safety concerns. Her writing aims to raise awareness about evolving cyber threats and legal responses.

Stay Connected