A fundamental flaw in Anthropic’s Model Context Protocol (MCP) risks exposing hundreds of thousands of AI-driven servers to remote code execution attacks. The vulnerability stems from MCP’s default STDIO transport, which executes received operating system commands without sanitization or execution boundaries.
Discovered by researchers at OX Security, the flaw affects all MCP deployments using the default STDIO transport, including prominent AI frameworks such as LiteLLM, LangFlow, and Flowise. The team identified 7,000 publicly accessible servers running STDIO transport and estimates at least 200,000 vulnerable instances across the MCP ecosystem. Their analysis uncovered arbitrary command execution capabilities on six live production platforms serving paying customers, leading to over ten CVEs rated high or critical across multiple tools.
Kevin Curran, IEEE senior member and cybersecurity professor at Ulster University, described the issue as "a shocking gap in the security of foundational AI infrastructure." OX Security’s research highlights four distinct exploitation families, each demonstrating how attackers could leverage the flaw to bypass security measures and execute unauthorized commands.
How the STDIO transport enables command injection
MCP’s STDIO transport is designed to connect AI agents to local tools by transmitting operating system commands directly. However, the protocol lacks any mechanism to sanitize or validate these commands, allowing malicious inputs to execute without restriction. When a command fails, the error message arrives only after the command has already run, leaving no trace in developer toolchains.
Researchers demonstrated that attackers could exploit this behavior through four primary methods:
- Unauthenticated command injection via AI framework interfaces: Targets tools like LangFlow and LiteLLM, where web-based interfaces accept user input that is forwarded to the operating system without validation.
- Hardening bypasses through command allowlists: Tools such as Flowise and Upsonic implement allowlists to restrict commands, but OX bypassed these controls using argument injection techniques like
npx -c. - Zero-click prompt injection in AI coding IDEs: Malicious HTML modifies local MCP configuration files, enabling command execution without user interaction. Windsurf (CVE-2026-30615) was uniquely vulnerable to this attack vector, while other IDEs like Cursor, Claude Code, and Gemini-CLI require some form of user interaction.
- Malicious package distribution via MCP registries: OX submitted a benign proof-of-concept to 11 registries, with nine accepting it without security review, demonstrating how attackers could distribute compromised packages.
Carter Rees, VP of AI and Machine Learning at Reputation and a member of the Utah AI Commission, emphasized the need to reframe the security posture around MCP. "MCP STDIO is a privileged execution surface, not a connector. Enterprise teams should treat it like production shell access—deny by default, allowlist, sandbox, and stop assuming downstream input validation will hold at scale," Rees stated.
Patch status and remaining gaps
The response from affected vendors has been inconsistent, with some releasing partial fixes while others have not yet addressed the issue. OX Security’s assessment reveals that no product has implemented a protocol-level fix, leaving the core vulnerability intact. The table below summarizes the patch status for key affected products, including the remaining security gaps and recommended actions:
Product Exploit type Patched? Protocol fix? The gap Action
LiteLLM Command injection via adapter UI Yes No New STDIO configs inherit Pin to v1.83.7-stable or later (CVE-2026-30623).
insecure default. Verify against GitHub advisory. Audit all other STDIO definitions.
LangFlow RCE via public auto_login + STDIO Partially No Patch addresses auto_login Disable public auto_login. Audit STDIO usage.
but not STDIO transport.
Flowise Hardening bypass via allowlist Partially No Allowlist bypass possible Implement strict input validation. Remove hardcoded allowlists.
Windsurf Zero-click prompt injection Yes No IDE-specific configuration Disable auto-execution of MCP commands. Review configuration files.
file modificationAnthropic, the creator of MCP, has acknowledged the behavior as "expected" and declined to modify the protocol’s design. The company maintains that STDIO’s execution model is intended as a secure default, shifting responsibility to developers for input sanitization. Anthropic has not issued a standalone public statement addressing the vulnerability or responded to requests for further clarification.
OX Security argues that expecting 200,000 developers to consistently implement correct input sanitization is impractical. The organization contends that attempts to sanitize STDIO either break the transport or push malicious payloads into deeper layers of the system. The debate highlights a fundamental tension between protocol design and practical security enforcement.
What to do on Monday morning
For security teams evaluating MCP deployments, five critical questions determine exposure and mitigation steps:
- Is my MCP deployment using STDIO transport by default? If yes, your environment is exposed regardless of patch status.
- Which exploitation family applies to my tools? Identify whether your AI frameworks, IDEs, or registries are vulnerable to command injection, allowlist bypasses, or zero-click attacks.
- Has my vendor released a patch, and does it address the root cause? Partial patches may mitigate specific attack vectors but leave the underlying STDIO flaw unaddressed.
- Are my developer workstations protected? IDE-specific vulnerabilities, particularly in Windsurf, Cursor, and Claude Code, pose risks to local environments. Review configuration files and disable auto-execution where possible.
- What is my plan for protocol-level mitigation? Until Anthropic addresses the STDIO design, enterprises must implement compensating controls such as network segmentation, strict allowlisting, and sandboxing to limit the blast radius of potential attacks.
The discovery of this flaw underscores the need for rigorous security practices in AI infrastructure. As MCP continues to gain adoption across major tech platforms, the stakes for addressing systemic vulnerabilities have never been higher.
AI summary
Anthropic’in Model Context Protocol’unda keşfedilen STDIO aktarım açığı, 200 binden fazla sunucuyu riske atıyor. Bu makalede, kimlerin etkilendiğini, tedarikçilerin yamalarını ve pazartesi sabahı yapılması gerekenleri öğrenin.
