MCP Incidents

A live database of security incidents affecting Model Context Protocol servers, clients, SDKs and transports. Each entry names the policy controls that would have prevented or contained it.

6 incidents · RSS
high 28 Apr 2026

Cursor Sandbox Escape via Git Hooks (CVE-2026-26268)

Cursor's AI agent can be told to write files. Nothing in versions before 2.5 prevented it from writing to <code>.git/hooks/</code>. An attacker who can inject a prompt into the agent's context, via a malicious repository...

CVE-2026-26268 Prompt Injection
critical 15 Apr 2026

Anthropic MCP STDIO RCE (OX Security disclosure)

OX Security found that Anthropic's official MCP SDKs hand configuration values directly to OS command execution over the STDIO transport. Any path that lets an attacker influence MCP server configuration (a malicious pac...

CVE-2025-49596 Supply Chain
high 15 Apr 2026

Windsurf Zero-Click Prompt Injection to RCE (CVE-2026-30615)

Open a file, get owned. Windsurf 1.9544.26 was the only AI IDE in the OX Security disclosure chain where exploitation required zero user interaction. Attacker-controlled HTML content, when rendered by the IDE, injected i...

CVE-2026-30615 Prompt Injection
critical 15 Apr 2026

Flowise and Upsonic MCP Hardening Bypass (CVE-2026-30625 / GHSA-c9gw-hvqq-f33r)

Both Flowise and Upsonic knew MCP STDIO was dangerous and built defences: command allowlists that restricted execution to trusted binaries like <code>npm</code>, <code>npx</code>, and <code>python</code>. OX Security byp...

CVE-2026-30625 RCE
critical in the wild 15 Mar 2026

MCPwn (CVE-2026-33032)

Two HTTP requests, full nginx server takeover. nginx-ui shipped its MCP server with AuthRequired() middleware on /mcp but not on its sibling /mcp_message. Anyone on the network could grab a session ID from the protected ...

CVE-2026-33032 Auth Bypass
high 26 May 2025

GitHub MCP Prompt Injection: Cross-Repo Data Heist

A planted issue in a public repo can convince a developer's AI agent to copy private repo contents into that public repo. The official GitHub MCP server hands the agent the user's full GitHub credentials, so private and ...

Prompt Injection
// GET IN TOUCH

Have a question or want to learn more? Send us a message.

Message sent.

We'll get back to you soon.

// REQUEST EARLY ACCESS

We're letting people in as fast as we can.

You're in the queue.

We'll be in touch as soon as we can let you in.