Researchers at JFrog discovered a critical vulnerability (CVE-2025-6514) in the mcp-remote tool that allows remote code execution when connecting to an untrusted MCP server. By exploiting a crafted OAuth response, attackers can trick mcp-remote into executing arbitrary OS commands on the client’s machine—leading to full system compromise. The flaw affects versions 0.0.5 to 0.1.15 and is triggered automatically during standard connection initialization.
Critical Vulnerability in Anthropic’s MCP Exposes Developer Machines to Remote Exploits
Researchers uncovered CVE-2025-49596, a critical remote code execution vulnerability in Anthropic’s MCP Inspectortool. By combining a browser flaw known as 0.0.0.0 Day with a CSRF weakness, attackers can execute arbitrary commands on a developer’s machine simply by luring them to a malicious website. The flaw affects default configurations lacking authentication, making local MCP services exploitable even when bound to localhost.
Critical RCE Vulnerability in Anthropic MCP Inspector – CVE-2025-49596
Security researchers at Oligo discovered CVE-2025-49596, a critical vulnerability in Anthropic’s MCP Inspector that allows remote code execution via a CSRF attack. By chaining the flaw with a known browser issue (“0.0.0.0 Day”), attackers can exploit default configurations and execute arbitrary commands on a developer’s machine simply by luring them to a malicious website. The issue affects MCP Inspector versions prior to 0.14.1 and highlights serious risks in browser-exposed local tooling.
Security Advisory: Anthropic’s Slack MCP Server Vulnerable to Data Exfiltration
A critical data exfiltration vulnerability was discovered in Anthropic’s deprecated Slack MCP Server, which allows attackers to leak sensitive information via link unfurling when AI agents post messages to Slack. Prompt injection can trigger an AI to include secret data in a hyperlink, which Slack then automatically fetches—sending that data to an attacker-controlled server. The server is no longer maintained and widely used, putting thousands of deployments at risk.
Neon official remote MCP exploited
A real-world attack demonstrated how prompt injection can be used to exploit the official Neon remote MCP server, allowing unauthorized changes to a production database via the powerful run_sql tool. By embedding malicious instructions in user-submitted data, an attacker can trick AI agents using tools like Cursor IDE into executing unintended SQL commands. The risk stems from mutation-capable MCP tools lacking guardrails, highlighting the need for stricter controls in agentic workflows.