<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"><channel><title>PolicyLayer MCP Incidents</title><description>Vulnerabilities, exploits and security disclosures affecting Model Context Protocol servers, clients, SDKs and infrastructure -- with the policy controls that would have prevented each one.</description><link>https://policylayer.com/</link><language>en-gb</language><item><title>Cursor Sandbox Escape via Git Hooks (CVE-2026-26268)</title><link>https://policylayer.com/mcp-incidents/cursor-sandbox-escape-git-hooks-cve-2026-26268/</link><guid isPermaLink="true">https://policylayer.com/mcp-incidents/cursor-sandbox-escape-git-hooks-cve-2026-26268/</guid><description>Cursor&apos;s AI agent can be told to write files. Nothing in versions before 2.5 prevented it from writing to &lt;code&gt;.git/hooks/&lt;/code&gt;. An attacker who can inject a prompt into the agent&apos;s context, via a malicious repository, a crafted issue body, or a poisoned tool response, can plant a hook script that Git will execute automatically on the next commit, push, or checkout. The sandbox breaks the moment the developer runs a routine Git operation. No second prompt required.</description><pubDate>Tue, 28 Apr 2026 00:00:00 GMT</pubDate><category>Prompt Injection</category><category>high</category><category>CVE-2026-26268</category></item><item><title>Anthropic MCP STDIO RCE (OX Security disclosure)</title><link>https://policylayer.com/mcp-incidents/ox-security-anthropic-mcp-rce/</link><guid isPermaLink="true">https://policylayer.com/mcp-incidents/ox-security-anthropic-mcp-rce/</guid><description>OX Security found that Anthropic&apos;s official MCP SDKs hand configuration values directly to OS command execution over the STDIO transport. Any path that lets an attacker influence MCP server configuration (a malicious package, a tampered config file, untrusted user input) becomes arbitrary command execution. Ten CVEs landed across downstream projects including LiteLLM, LangChain, LangFlow, Flowise, LettaAI, LangBot, MCP Inspector, and Cursor. The supply chain footprint: 7,000+ publicly accessible servers, 150M+ package downloads, up to 200,000 vulnerable instances. Anthropic&apos;s response: this is by design. Sanitisation is the developer&apos;s job.</description><pubDate>Wed, 15 Apr 2026 00:00:00 GMT</pubDate><category>Supply Chain</category><category>critical</category><category>CVE-2025-49596</category><category>CVE-2026-22252</category><category>CVE-2026-22688</category><category>CVE-2025-54994</category><category>CVE-2025-54136</category></item><item><title>Windsurf Zero-Click Prompt Injection to RCE (CVE-2026-30615)</title><link>https://policylayer.com/mcp-incidents/windsurf-zero-click-mcp-rce-cve-2026-30615/</link><guid isPermaLink="true">https://policylayer.com/mcp-incidents/windsurf-zero-click-mcp-rce-cve-2026-30615/</guid><description>Open a file, get owned. Windsurf 1.9544.26 was the only AI IDE in the OX Security disclosure chain where exploitation required zero user interaction. Attacker-controlled HTML content, when rendered by the IDE, injected instructions that silently modified the local MCP JSON configuration and registered a malicious STDIO server. The MCP SDK did the rest: it launched the server binary and handed the attacker a command execution primitive. No click, no approval prompt, no warning in the developer toolchain.</description><pubDate>Wed, 15 Apr 2026 00:00:00 GMT</pubDate><category>Prompt Injection</category><category>high</category><category>CVE-2026-30615</category></item><item><title>Flowise and Upsonic MCP Hardening Bypass (CVE-2026-30625 / GHSA-c9gw-hvqq-f33r)</title><link>https://policylayer.com/mcp-incidents/flowise-upsonic-mcp-hardening-bypass-cve-2026-30625/</link><guid isPermaLink="true">https://policylayer.com/mcp-incidents/flowise-upsonic-mcp-hardening-bypass-cve-2026-30625/</guid><description>Both Flowise and Upsonic knew MCP STDIO was dangerous and built defences: command allowlists that restricted execution to trusted binaries like &lt;code&gt;npm&lt;/code&gt;, &lt;code&gt;npx&lt;/code&gt;, and &lt;code&gt;python&lt;/code&gt;. OX Security bypassed both in under a minute by passing &lt;code&gt;npx -c &amp;lt;command&amp;gt;&lt;/code&gt;. The binary is on the allowlist; the argument that turns it into an arbitrary shell executor is not. The finding is a case study in why surface-level allowlists fail against the MCP STDIO execution model, and why the fix required filtering not just command names but every flag that enables inline execution.</description><pubDate>Wed, 15 Apr 2026 00:00:00 GMT</pubDate><category>RCE</category><category>critical</category><category>CVE-2026-30625</category></item><item><title>MCPwn (CVE-2026-33032)</title><link>https://policylayer.com/mcp-incidents/mcpwn-cve-2026-33032/</link><guid isPermaLink="true">https://policylayer.com/mcp-incidents/mcpwn-cve-2026-33032/</guid><description>Two HTTP requests, full nginx server takeover. nginx-ui shipped its MCP server with AuthRequired() middleware on /mcp but not on its sibling /mcp_message. Anyone on the network could grab a session ID from the protected endpoint, replay it against the unprotected one, and invoke any of twelve destructive tools. One of them, nginx_config_add, accepts arbitrary configuration with auto-reload. Roughly 2,600 instances were exposed on the default port at disclosure; Recorded Future listed it among 31 vulnerabilities under active exploitation in March 2026.</description><pubDate>Sun, 15 Mar 2026 00:00:00 GMT</pubDate><category>Auth Bypass</category><category>critical</category><category>CVE-2026-33032</category></item><item><title>GitHub MCP Prompt Injection: Cross-Repo Data Heist</title><link>https://policylayer.com/mcp-incidents/github-mcp-prompt-injection-may-2025/</link><guid isPermaLink="true">https://policylayer.com/mcp-incidents/github-mcp-prompt-injection-may-2025/</guid><description>A planted issue in a public repo can convince a developer&apos;s AI agent to copy private repo contents into that public repo. The official GitHub MCP server hands the agent the user&apos;s full GitHub credentials, so private and public scope live in the same context. The agent reads issue bodies as if they were user instructions. Anyone who can open an issue can plant instructions. The attack is the classic confused deputy, executed through tools the user trusted.</description><pubDate>Mon, 26 May 2025 00:00:00 GMT</pubDate><category>Prompt Injection</category><category>high</category></item></channel></rss>