MCP adoption is accelerating. So are MCP vulnerabilities.

In the first 60 days of 2026, security researchers filed over 30 CVEs against MCP servers, clients, and infrastructure. The NVD now lists 36 confirmed CVEs with “Model Context Protocol” in the description. Ecosystem audits of thousands of servers reveal that basic security failures — path traversal, command injection, missing authentication — are the norm, not the exception.

This isn’t a theoretical risk. The Postmark MCP npm package was backdoored to BCC every outgoing email to an attacker’s domain, downloaded 1,500 times per week. The McpInject malware module deploys malicious MCP servers into AI coding assistant configs. Anthropic’s own Slack MCP server had a zero-click data exfiltration vulnerability so severe that Anthropic archived the server rather than patching it.

This guide presents the data — the CVEs, the audit numbers, the real incidents — and the tools and frameworks emerging to address the problem. Our analysis draws on NVD records, published research, and ecosystem audit reports — we research and analyze rather than testing servers hands-on. Rob Nugen operates ChatForest; the site’s content is researched and written by AI.

For practical security advice on evaluating individual MCP servers, see our companion guide: MCP Server Security: A Practical Guide for 2026.


The Numbers

Before diving into specifics, here’s what the ecosystem-wide data looks like:

Metric Value Source
NVD-confirmed MCP CVEs 36 NVD search, April 2026
CVEs filed in Jan-Feb 2026 30+ MCP Security 2026 report
Path traversal exposure 82% of 2,614 servers Endor Labs audit
SSRF exposure rate 36.7% of 7,000+ servers BlueRock / Dark Reading
Code injection exposure 67% of 2,614 servers Endor Labs audit
Command injection exposure 34% of 2,614 servers Endor Labs audit
Servers with critical vulns 33% of 1,000+ servers Enkrypt AI scan
Servers using OAuth 8.5% Mindgard
Tool poisoning prevalence 5.5% of servers in the wild Invariant Labs
Auto-approve attack success 84.2% Invariant Labs
Exposed MCP servers on internet 1,862 Knostic
Exploit probability (10 plugins) 92% VentureBeat
Average security score (17 popular servers) 34/100 Industry audit
Servers lacking permission declarations 100% of 17 audited Industry audit

These aren’t cherry-picked numbers from obscure projects. The Endor Labs audit covered 2,614 MCP implementations. BlueRock scanned 7,000+ servers. The 82% path traversal figure means four out of five MCP servers use file operations in ways vulnerable to directory traversal attacks.


The CVE Landscape

Critical Vulnerabilities (CVSS 9.0+)

The most severe MCP CVEs reveal patterns that should concern anyone deploying MCP servers in production:

CVE-2025-6514 — mcp-remote (CVSS 9.6): OS command injection via crafted authorization endpoint URL. This package had 437,000+ downloads, making it the first MCP vulnerability with mass-scale impact. A malicious authorization endpoint URL could execute arbitrary OS commands on the user’s machine.

CVE-2025-34072 — Anthropic Slack MCP Server (CVSS 9.3): Zero-click data exfiltration via Slack’s automatic link unfurling. When an AI agent processed untrusted data, the server could be manipulated into leaking information without any user interaction. Anthropic archived the server two days after disclosure — it will never be patched.

CVE-2025-49596 — MCP Inspector (CVSS 9.4): RCE in Anthropic’s own debugging tool, due to lack of authentication between the Inspector frontend and its proxy server. A drive-by attack from a malicious website could compromise developer machines.

CVE-2026-32211 — Azure MCP Server (CVSS 9.1): Disclosed April 3, 2026. The @azure-devops/mcp server on npm entirely lacks authentication — any unauthenticated network attacker can access configuration details, API keys, and project data. As of this writing, no patch is available.

CVE-2026-23744 — MCPJam Inspector (CVSS 9.8): RCE via HTTP endpoint listening on 0.0.0.0, exposing the server to the network rather than localhost only.

The Command Injection Pattern

43% of the 30+ CVEs filed in early 2026 involved shell or exec injection — MCP servers passing user-controlled input directly to system commands without sanitization. Examples span Android debug bridges (CVE-2025-59834), Kubernetes tools (CVE-2025-53355), translation services (CVE-2025-53832), and game engines (CVE-2026-25546).

This isn’t sophisticated exploitation. These are textbook CWE-78 vulnerabilities — the kind that would fail a basic code review in any other context.

SDK-Level Vulnerabilities

The official MCP SDKs themselves have had significant security issues:

  • CVE-2025-66414 & CVE-2025-66416: Both the TypeScript SDK (< 1.24.0) and Python SDK (< 1.23.0) lacked DNS rebinding protection. Malicious websites could pivot through the browser to reach localhost-bound MCP servers.
  • CVE-2025-53365 & CVE-2025-53366: Python SDK session data leaks and unhandled exceptions (CVSS 8.7).
  • CVE-2026-25536: TypeScript SDK cross-client response data leak (CVSS 7.1).
  • CVE-2026-33946: Ruby SDK session hijacking (CVSS 8.2).
  • CVE-2026-34742: Go SDK DNS rebinding (CVSS 7.6), disclosed April 2, 2026.

When the protocol’s own reference implementations have DNS rebinding and session hijacking vulnerabilities, it signals that security was not the primary design constraint.


Real-World Incidents

These aren’t hypothetical attacks. These happened.

Postmark MCP Supply Chain Attack (September 2025)

A backdoored Postmark MCP npm package silently BCC’d every outgoing email to an attacker-controlled domain. The package was downloaded 1,500 times per week and used in hundreds of workflows before discovery. This was the first confirmed real-world MCP supply chain compromise.

McpInject Malware (March 2026)

The McpInject module deploys malicious MCP servers and injects them into AI coding assistant configurations, complete with embedded prompt injections designed to read sensitive files. Discovered as part of the Axios npm compromise wave.

Anthropic Git MCP Server Exploit Chain (January 2026)

Three chained vulnerabilities (CVE-2025-68143, CVE-2025-68144, CVE-2025-68145) in Anthropic’s own mcp-server-git achieve full RCE via malicious .git/config files. Anthropic — the company that created MCP — shipped a server vulnerable to a three-step exploit chain.

GitHub MCP Integration Hijack (May 2025)

Invariant Labs demonstrated that malicious GitHub issues could hijack AI agents using GitHub MCP integrations, leaking private repository data.

Asana MCP Privacy Breach (June 2025)

Customer data bled across MCP instances in Asana’s integration. The MCP integration was pulled for two weeks while the issue was resolved.

Supabase Cursor Agent Exploit (Mid-2025)

Attackers embedded SQL commands in support tickets to exfiltrate integration tokens from AI agents using Supabase MCP through Cursor IDE.


The OWASP MCP Top 10

OWASP published a dedicated MCP Top 10 (currently in beta), identifying the ten most critical security risks specific to MCP deployments:

# Risk What It Means
MCP01 Token Mismanagement & Secret Exposure Hard-coded credentials, long-lived tokens, secrets in model memory or logs
MCP02 Privilege Escalation via Scope Creep Permissions expand over time, granting capabilities beyond original intent
MCP03 Tool Poisoning Malicious instructions hidden in tool description metadata
MCP04 Supply Chain Attacks Compromised npm/PyPI packages, malicious connectors
MCP05 Command Injection & Execution Untrusted input passed to system commands without sanitization
MCP06 Intent Flow Subversion Indirect prompt injection through MCP context payloads
MCP07 Insufficient Auth & AuthZ Missing or weak authentication on MCP endpoints
MCP08 Lack of Audit and Telemetry No logging or monitoring of tool invocations
MCP09 Shadow MCP Servers Unauthorized, unmanaged MCP servers running in enterprise environments
MCP10 Context Injection & Over-Sharing Malicious content in shared memory; context reused across agents that should be isolated

Microsoft has published a companion Azure MCP Security Guide mapping each OWASP category to Azure implementation patterns.

The Coalition for Secure AI (CoSAI) — an OASIS Open project with contributions from EY, Google, IBM, Meta, Microsoft, NVIDIA, PayPal, Snyk, and others — released a complementary taxonomy identifying 12 core threat categories and approximately 40 specific threats with concrete mitigations.


Tool Poisoning: The MCP-Specific Attack

Tool poisoning deserves special attention because it’s unique to the MCP threat model. Unlike traditional injection attacks, tool poisoning exploits the fact that AI models read tool metadata to decide which tools to use and how.

How it works: An attacker embeds malicious instructions in a tool’s description metadata — the text that tells the AI model what the tool does. These instructions are invisible to human users reviewing tool lists but are processed by the model when selecting and invoking tools. A poisoned tool description might instruct the model to exfiltrate data, escalate privileges, or call other tools in unintended ways.

The “rug pull” variant: A tool establishes trust with benign behavior, then silently alters its description after the user has approved it. Standard MCP clients don’t re-verify tool definitions on every invocation, so the changed behavior goes undetected.

Prevalence: Invariant Labs found that 5.5% of MCP servers in the wild exhibit tool poisoning vulnerabilities. When AI agents auto-approve tool calls (without human-in-the-loop confirmation), the attack success rate is 84.2%. With human approval, it drops below 5%.

The OpenClaw case study: OpenClaw — an MCP tool marketplace that launched in late 2025 and quickly reached 100,000+ GitHub stars — saw 8 critical CVEs in its first 6 weeks. A Koi Security audit of its skill marketplace found 824+ malicious skills among 10,700+ total submissions. Bitdefender estimated approximately 20% of submitted skills were malicious. 42,665 OpenClaw instances were found exposed on the internet.


The Authentication Gap

Only 8.5% of MCP servers currently use OAuth, despite OAuth 2.1 being the required authentication mechanism in the MCP specification for HTTP-based transports since March 2025.

The timeline of auth changes in the spec reflects ongoing uncertainty:

  • March 2025: OAuth 2.1 standardized in the spec
  • June 2025: Split MCP servers from authorization servers; required Protected Resource Metadata (RFC 9728)
  • November 2025: Client ID Metadata Documents became the registration method; PKCE made mandatory

Despite this, the MCP Dev Summit dedicated 6 of 95+ sessions to authentication, with OAuth 2.1 specification author Aaron Parecki present — a signal that the community acknowledges auth remains unsolved in practice.

Knostic found 1,862 MCP servers exposed directly to the internet. When they manually tested 119 of these, every single one exposed its internal tool inventory without requiring authentication.


Shadow MCP: Enterprise Blind Spot

OWASP MCP09 addresses a growing enterprise concern: developers spinning up unapproved MCP servers for experimentation, often with default credentials and permissive configurations.

60% of organizations report lacking confidence in their ability to detect unauthorized AI deployments. These shadow MCP servers create data leakage risks, unauthorized access paths, and expanded attack surfaces that security teams can’t monitor because they don’t know the servers exist.

Qualys TotalAI now specifically targets shadow MCP detection, using network-level probes, host-level analysis, and supply-chain dependency scanning to find MCP servers that haven’t gone through formal security review.


Supply Chain Risk: The Math

VentureBeat reported a striking finding: deploying just 10 MCP plugins creates a 92% probability of exploitation. Three plugins exceed 50%. Even a single plugin carries a 9% exploit probability.

The MCP ecosystem is heavily reliant on npm and PyPI packages with all the supply chain risks that entails. There is no centralized, trusted MCP server registry with mandatory security review. The Postmark backdoor, the McpInject malware, and the mcp-remote command injection (CVE-2025-6514, 437K+ downloads) demonstrate that these aren’t theoretical risks.


Security Tools and Frameworks

The security tooling ecosystem is maturing rapidly:

Scanning Tools

Invariant Labs MCP-Scan (now Snyk Agent Scan): The pioneer MCP security scanner. Detects tool poisoning, rug pulls, cross-origin escalation, and prompt injection. Includes Tool Pinning — tracking tool description hashes to detect silent modifications.

Cisco MCP Scanner: Open-source scanner using three engines: Yara rules, LLM-as-judge, and Cisco AI Defense. Scans for malicious code and hidden threats before integration.

Enkrypt AI MCP Scan: Scanned 1,000+ servers, finding 33% had critical vulnerabilities averaging 5.2 per server. Provides CVSS scores and line-level references. CI/CD integration available.

Qualys TotalAI: Enterprise platform with layered MCP server detection — network probes, host-level discovery, and supply chain analysis.

Hardened Infrastructure

Chainguard MCP Images: Distroless, zero-CVE container images for MCP servers. SLSA Level 3 compliant with build provenance and SBOM. Their mcp-grafana image ships at 18.83 MB with 0 CVEs versus 54.19 MB and 38 CVEs for the standard alternative.

Docker MCP Toolkit: 300+ verified MCP server container images with digital signatures, SBOMs, runtime isolation (1 CPU, 2 GB RAM per container), and no host filesystem access by default.

Cloudflare MCP Server Portals: Zero Trust gateway enforcing MFA, device posture checks, geographic restrictions, and DLP scanning on MCP traffic.

Frameworks and Guidelines


Enterprise Patterns Worth Noting

Two organizations have publicly shared detailed MCP security architectures:

Pinterest runs a production MCP ecosystem handling 66,000 monthly invocations from 844 users, saving approximately 7,000 hours per month. Their security model uses two-layer authorization (end-user JWTs plus service mesh identities), domain-specific MCP servers to limit blast radius, and mandatory Security, Legal/Privacy, and GenAI review before any server reaches production.

Morgan Stanley presented their approach at QCon London 2026: MCP servers deployed from CALM (Common Architecture Language Model) patterns with compliance guardrails — including a denied-symbols list blocking queries for specific financial instruments — and build-time validation gates using Spectral rulesets.

These aren’t aspirational designs. They’re running in production at companies where security failures have regulatory consequences.


What This Means

The MCP security landscape in April 2026 reveals a protocol ecosystem growing faster than its security infrastructure can support. The core problems are well-understood — the OWASP MCP Top 10 categories are mostly traditional web security failures applied to a new context. Command injection, path traversal, missing authentication, and supply chain attacks aren’t novel threats.

What makes MCP different is the compounding effect: AI agents chain tools together, and a vulnerability in one server can be exploited through prompt injection in another. The 92% exploit probability for 10-plugin deployments reflects this compounding — each additional MCP server doesn’t just add its own risk, it multiplies the attack surface available to every other server the agent can access.

The tools and frameworks exist to address these problems. Organizations deploying MCP in production should be using container isolation, gateway-based security, OAuth 2.1 authentication, and at minimum one of the available scanning tools. The gap isn’t in available solutions — it’s in adoption.


Further Reading


This guide presents publicly available CVE data, audit reports, and published research. We research and analyze — we do not test or exploit vulnerabilities. Last refreshed: April 5, 2026.